Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 13:15

General

  • Target

    e5bbdaf1b6f918baaef87f3dd0ddb1eb524f5a746aeb28fdea23a17eb4a10d90.exe

  • Size

    108KB

  • MD5

    6e380f4b0851bea21025c0acd63e936e

  • SHA1

    2ebcd301af2234dd6f6f49ea604ec6be5ffce796

  • SHA256

    e5bbdaf1b6f918baaef87f3dd0ddb1eb524f5a746aeb28fdea23a17eb4a10d90

  • SHA512

    c93553b46883ad191434cb8bc15c0c8d764ac8968961cdc9fa6067d02e3e543def01c565079dabd389396922b3333e2a70ef3f1b2177694be7e8b362ee62c007

  • SSDEEP

    3072:pbbz8qaHZAobJ6PgvpX6Xi3AmgousPv50/P:pbbzna/EP8druPX

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\e5bbdaf1b6f918baaef87f3dd0ddb1eb524f5a746aeb28fdea23a17eb4a10d90.exe
        "C:\Users\Admin\AppData\Local\Temp\e5bbdaf1b6f918baaef87f3dd0ddb1eb524f5a746aeb28fdea23a17eb4a10d90.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1408

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1408-54-0x0000000074B51000-0x0000000074B53000-memory.dmp

      Filesize

      8KB