Analysis

  • max time kernel
    157s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 00:35

General

  • Target

    1676b21159bab7aa9829851a9b039be109a8d4e7da6a6c3f54dba7a9889aa699.exe

  • Size

    77KB

  • MD5

    a0fcd2e10a681cd54cccaa347989dce0

  • SHA1

    fba940142c98071af2c4040b75aa39433010259c

  • SHA256

    1676b21159bab7aa9829851a9b039be109a8d4e7da6a6c3f54dba7a9889aa699

  • SHA512

    347856b0f331d3878e8cae72ef99deff7c1d1ab79605e66d895b9ed55088ed10877d907d51b3410fc59bf67d8db5d7c8fbf5761d0d54898e44f15b99f77c0e38

  • SSDEEP

    1536:TO+AZhCZFcsifjE0SJIB/6pCypfoe6WH/RgIc:TO3ZhHsio0tBGCzoRHc

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:380
      • C:\Users\Admin\AppData\Local\Temp\1676b21159bab7aa9829851a9b039be109a8d4e7da6a6c3f54dba7a9889aa699.exe
        "C:\Users\Admin\AppData\Local\Temp\1676b21159bab7aa9829851a9b039be109a8d4e7da6a6c3f54dba7a9889aa699.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3436

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads