Analysis

  • max time kernel
    46s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 00:28

General

  • Target

    b38315bed165944abfbe9332b56ff78b84feefdeb6327646f2ab8c464520d98d.exe

  • Size

    77KB

  • MD5

    a12b30634ff4359c8ba7816a95eb6ab0

  • SHA1

    161c44c642bafd3348c30384bf2b17be14da557c

  • SHA256

    b38315bed165944abfbe9332b56ff78b84feefdeb6327646f2ab8c464520d98d

  • SHA512

    3e00f0b0be2c7c47918c5ceadccff61000906b87e6a23d1fc962ef6e5e14ba2f78aa580bf5a545c730bed68818d1a90f4403ea8c3eb2b69745b0f466eb90eb7a

  • SSDEEP

    1536:TO+AZhCZFcsifjE0SJIB/6pCypfoe6WH/RgN:TO3ZhHsio0tBGCzoRm

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1344
      • C:\Users\Admin\AppData\Local\Temp\b38315bed165944abfbe9332b56ff78b84feefdeb6327646f2ab8c464520d98d.exe
        "C:\Users\Admin\AppData\Local\Temp\b38315bed165944abfbe9332b56ff78b84feefdeb6327646f2ab8c464520d98d.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1880

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads