Analysis

  • max time kernel
    77s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 08:08

General

  • Target

    9bf7579c2138f75748263e1e85978adb173b7b3ebd1c599269459cc88f7ccdfd.exe

  • Size

    62KB

  • MD5

    72438911c1f3750cc7289c79943188d7

  • SHA1

    7b2e8a87182fdf71581b6f95b95b5b3ab1117dc4

  • SHA256

    9bf7579c2138f75748263e1e85978adb173b7b3ebd1c599269459cc88f7ccdfd

  • SHA512

    ea2b644e7aecb5654eb499b85c09ed64a8a3488bb9794b92314d1cf58d159be4df7a3623c56622b6eb1d3b4107411c40f4c304ffedf803e97d798ab76b93047a

  • SSDEEP

    768:Aa49L3KGCHRmu3W0IBYwKnPCUHFrsobbfqKtSpCq7OT2iXZmOTIvOTQZDZ:AvCT3nPCUlrsobbEp3OT2iXAOTqOToF

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3024
      • C:\Users\Admin\AppData\Local\Temp\9bf7579c2138f75748263e1e85978adb173b7b3ebd1c599269459cc88f7ccdfd.exe
        "C:\Users\Admin\AppData\Local\Temp\9bf7579c2138f75748263e1e85978adb173b7b3ebd1c599269459cc88f7ccdfd.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1596

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1596-132-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1596-134-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/3024-133-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB