Analysis

  • max time kernel
    157s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2022 20:41

General

  • Target

    7988c95c34e41a038d5e7331ef0755ce6c82fac403a3966d11d2cf6124975e06.exe

  • Size

    56KB

  • MD5

    a0ad225fb7f2aa15186d90c261d3ace0

  • SHA1

    e2df6adc5b5085fd49778f042fe604e9efb954c7

  • SHA256

    7988c95c34e41a038d5e7331ef0755ce6c82fac403a3966d11d2cf6124975e06

  • SHA512

    4155b80b83a0b028c588744e453cefb5ac222e4fc2b24a076ff8f24820abd1b8373ac70a4869ffde7a6a54a43575e8aea612908b05adb3816e04f0403ac7b371

  • SSDEEP

    768:uaYoXNTzXdxrSbfnU7BmGMTY1xEnMaoje0hRYB2+3tz73ZVFKo35STqtbz6LSsOY:uaJdsnxxnFojNMtXLFrSs+b8pEsc

Score
8/10

Malware Config

Signatures

  • Contacts a large (572) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7988c95c34e41a038d5e7331ef0755ce6c82fac403a3966d11d2cf6124975e06.exe
    "C:\Users\Admin\AppData\Local\Temp\7988c95c34e41a038d5e7331ef0755ce6c82fac403a3966d11d2cf6124975e06.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4968-132-0x00000000001E0000-0x00000000001FE000-memory.dmp

    Filesize

    120KB

  • memory/4968-133-0x00000000001E0000-0x00000000001FE000-memory.dmp

    Filesize

    120KB