Analysis

  • max time kernel
    169s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 20:29

General

  • Target

    3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe

  • Size

    2.0MB

  • MD5

    7b1eeb327613f8e1d4ec2144ec3d3dd9

  • SHA1

    4075598183dbda145f17de252acd319279b9d5d8

  • SHA256

    3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460

  • SHA512

    61b3633f58d96f7d06f3c8941b72d8a12a4539a60a66d221246572d241a5426fd67601b7bc41578cd348acad39dfe41d798ec8f4b60a07189516db51915cef59

  • SSDEEP

    24576:GKB58mnEzeDI4SY2SNxSuYPvex2HSC5Y+1YhL7:bqmEBoFx2y1+1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
    "C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
      3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
        3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
          3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4980
          • C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
            3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2904
            • C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
              3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1852
              • C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
                3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:5008
                • C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
                  3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M
                  8⤵
                    PID:1204

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

            Filesize

            84B

            MD5

            ae3f07b37f66a120eeb0a16d00eff042

            SHA1

            db1d61a84414b829c71a5a4acd76ebba03032890

            SHA256

            e6711279e973b77c7a58f2e73fe695d3c7408ab2c5affd4dd4f4dd2130fa10fe

            SHA512

            bcc62f799ac4ca7fcd1860de25dc5f56f7fc4b4fbdaf0d940435f9bad54a3b8851712dec938f32e2866b0c23ab0a5a6534b58db20b9bf2a79e70ecaf400522ab

          • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

            Filesize

            126B

            MD5

            83704727be3e00136cc1ab39987c3945

            SHA1

            6ef8f469d9fdf5baaa2501ba4042267bdeff6451

            SHA256

            eed3869f248260ab855cd760c7b646e63766ee77f4dd6db956e3663f78297368

            SHA512

            71367dbb34e6b09909fc4aa014ca6603d634c4599c82b8f7590007229ef9babf6c5358c2e91cb33d2144e40be358f61a5302046016e7d719182987a7942b970f

          • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

            Filesize

            168B

            MD5

            989758f4820dad78308461872b6270c2

            SHA1

            fca59cf7f458896f035c5b9b462f44b054ec200d

            SHA256

            64fa7b1262f2d38b355a16f6c0085ab98ac569ccb374252a7889660940c62659

            SHA512

            62d60f4f558b1df4f5f2df86acdc0dee71c77d902dcfe7327b0befa0ea8ba851e0dd07dc583ceb62550805bcbf8e8a76ae9ea1cc687de2c7349757b82311ad72

          • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

            Filesize

            210B

            MD5

            a04e7067b17e1df6e116bc4462a7f29c

            SHA1

            c0e1dc474accdf78592bc6e6b6e59d9beb7fcae9

            SHA256

            1eeb4a47bf4348929628089922715bb4305a684bea2c90413781414f478fa4c9

            SHA512

            1c765c741438d19a148125220fd262fa2a5329e2ecc1ab40073e67a2c8ac0bc45d0c9b2b58dd79299cf5b02f9d263e2655bd48f1462ad47f817132c7ee10c034

          • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

            Filesize

            252B

            MD5

            19d5e834ba99dca7210bafbd0e365f97

            SHA1

            2fc2e9d972ff0ab63a12d71a27da0e0c7b84426c

            SHA256

            b0e37808571d9d6686dc57b65ef16fa6bd81a55523c3d8ec0521de9f7e2af96e

            SHA512

            905885778e10a3c86c7ed2d41ed7f31e54295b6f9017474410b656e124d3d40fe221979b6fa47f2adb3c884f61222e5c4fc31c2f4f85f3c9176b4e349195babe

          • C:\Users\Admin\AppData\Local\Temp\Log\log.txt

            Filesize

            294B

            MD5

            6281893dcb5184a5db31faa3e6db2021

            SHA1

            614b4dbb74b6022ec27d21029091327d6ca524a6

            SHA256

            0ed5beceab63df4ee4bf99ae90b36b993465966dc11ebe87295d71c059c689c5

            SHA512

            9f50513c8196321c922614a8f42a37904ebb895ad0baaef05c104543dd6dd12efc4362590ae29b0bb84c9b2bba2408527d71d45ac86f2cbb986fa456c81121a6