Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 16:47

General

  • Target

    eaa646e794325a9f3c39272096adf101d6347ad8f0c098a84d401717bc78ad3f.exe

  • Size

    320KB

  • MD5

    6825f532b9ec62ac9a1bbc600cd4b390

  • SHA1

    fc6063d41bb030cb7f3fb11b65cd7830fd94d599

  • SHA256

    eaa646e794325a9f3c39272096adf101d6347ad8f0c098a84d401717bc78ad3f

  • SHA512

    b69da06a90acb777883ebdd78a12e51ad1276137640f6820210f0c96700135ea5b7d164b29d26c4596fc7b2661b73e7981fe0fe3963154a61fa224ed30d49f24

  • SSDEEP

    6144:znVlZvp5psPkSH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:znLZKz2EB0NxDIBuOFe7/uT

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaa646e794325a9f3c39272096adf101d6347ad8f0c098a84d401717bc78ad3f.exe
    "C:\Users\Admin\AppData\Local\Temp\eaa646e794325a9f3c39272096adf101d6347ad8f0c098a84d401717bc78ad3f.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4060

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4060-135-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/4060-136-0x00000000001E0000-0x00000000001FE000-memory.dmp

          Filesize

          120KB

        • memory/4060-137-0x00000000001E0000-0x00000000001FE000-memory.dmp

          Filesize

          120KB

        • memory/4060-138-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB