Analysis

  • max time kernel
    96s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2022 05:39

General

  • Target

    561e342fac7874e11585007c0404cfc65a8ca1aab4137f7aa959283d4153ef76.exe

  • Size

    315KB

  • MD5

    6dde5310014867fdecdfde6269c150fb

  • SHA1

    64647f4a975b8eae118e45f076b2e29d98147f13

  • SHA256

    561e342fac7874e11585007c0404cfc65a8ca1aab4137f7aa959283d4153ef76

  • SHA512

    c9e8e3987d167e378a86062cfb2cb094e96b5ac227671567e14a020897ee8280b9b583b3ade4c1e3c1ec66d512a17dd0b180dc1d19362c4af00506c48b2f93d3

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

    suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\561e342fac7874e11585007c0404cfc65a8ca1aab4137f7aa959283d4153ef76.exe
    "C:\Users\Admin\AppData\Local\Temp\561e342fac7874e11585007c0404cfc65a8ca1aab4137f7aa959283d4153ef76.exe"
    1⤵
    • Drops file in Windows directory
    PID:4380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4380-130-0x0000000004C10000-0x0000000004C3F000-memory.dmp
    Filesize

    188KB