Analysis

  • max time kernel
    106s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 06:54

General

  • Target

    6f0a7435d6327479f6c352f6c72558eb9fcf89679b5baa66b69a390a9b4b6280.exe

  • Size

    315KB

  • MD5

    59d86bb20bfc9c68359c6403e6fee260

  • SHA1

    bc541b88ed89e11b1500c8cc4508611880cf6330

  • SHA256

    6f0a7435d6327479f6c352f6c72558eb9fcf89679b5baa66b69a390a9b4b6280

  • SHA512

    9f5ebf91ed4a375e6446c14378d58b4ac0ffaa566be0b0a2d6b300074a4334ef704ca4b5d05fea0eedc2d4af4b3969f41a68997bab7cbdcc74834e01a2b5385d

  • SSDEEP

    3072:WXDXL0Bvnj+QF6WiGLjTDJzyWdt3o6VHMap3j8PZ9wi9kPnfIYrAIb0p2:WXDXL0BvnjbJDB7VHMkzQB9qnxco0p

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0a7435d6327479f6c352f6c72558eb9fcf89679b5baa66b69a390a9b4b6280.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0a7435d6327479f6c352f6c72558eb9fcf89679b5baa66b69a390a9b4b6280.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3552

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3552-132-0x0000000000400000-0x0000000000471000-memory.dmp

          Filesize

          452KB

        • memory/3552-133-0x0000000000400000-0x0000000000471000-memory.dmp

          Filesize

          452KB