Analysis

  • max time kernel
    156s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    21-03-2022 04:03

General

  • Target

    sample.exe

  • Size

    2.9MB

  • MD5

    d0ecb14c0a4471fb66c6486c15d42ea6

  • SHA1

    3a65eec2ee58ff18fc8c89f05f390b689c65250a

  • SHA256

    c124dc2c4f82b3258f1538656de8cbd2c5133137cad2d6c7b874de8232763d95

  • SHA512

    31db2bfea122a4de878731503d30fe05bf23c42336436666149cda4b57703a6be4fecda84dd1a5983fa85edffb0e2ac5139505ce975eb53ad2ae46f8d2b4d362

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
      PID:2940
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      1⤵
      • Drops file in Windows directory
      PID:4420

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4420-135-0x000002A44DFE0000-0x000002A44DFF0000-memory.dmp

      Filesize

      64KB

    • memory/4420-134-0x000002A44DF80000-0x000002A44DF90000-memory.dmp

      Filesize

      64KB

    • memory/4420-136-0x000002A44E3A0000-0x000002A44E3A4000-memory.dmp

      Filesize

      16KB

    • memory/4420-137-0x000002A4508F0000-0x000002A4508F4000-memory.dmp

      Filesize

      16KB

    • memory/4420-138-0x000002A4508F0000-0x000002A4508F4000-memory.dmp

      Filesize

      16KB

    • memory/4420-139-0x000002A450900000-0x000002A450904000-memory.dmp

      Filesize

      16KB

    • memory/4420-140-0x000002A4508F0000-0x000002A4508F1000-memory.dmp

      Filesize

      4KB

    • memory/4420-141-0x000002A450A40000-0x000002A450A44000-memory.dmp

      Filesize

      16KB

    • memory/4420-142-0x000002A450A40000-0x000002A450A44000-memory.dmp

      Filesize

      16KB