Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2022 23:38

General

  • Target

    48c609ac8dc9fb0e9b51f93f5c0c79992970d43f3b1b40095ca83205f7fe6bc0.exe

  • Size

    320KB

  • MD5

    006fd725954a48d3438b6b9dfb9a75e0

  • SHA1

    ee83a8c4a02017dab05061cbe1f231606ff2be40

  • SHA256

    48c609ac8dc9fb0e9b51f93f5c0c79992970d43f3b1b40095ca83205f7fe6bc0

  • SHA512

    c511d1491bb0a4c389c81e81a110ea767533fb9b82d39aa5450f6218bda0c67567c212e3380a22d60326394d3cf4c1c46077900d78e91b17502cc90260fef0eb

  • SSDEEP

    6144:h5tRXbbfS+H2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:h5LPR2EB0NxDIBuOFe7/uT

Score
8/10

Malware Config

Signatures

  • Contacts a large (520) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48c609ac8dc9fb0e9b51f93f5c0c79992970d43f3b1b40095ca83205f7fe6bc0.exe
    "C:\Users\Admin\AppData\Local\Temp\48c609ac8dc9fb0e9b51f93f5c0c79992970d43f3b1b40095ca83205f7fe6bc0.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4980-132-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4980-133-0x0000000000540000-0x000000000055E000-memory.dmp

    Filesize

    120KB

  • memory/4980-134-0x0000000000540000-0x000000000055E000-memory.dmp

    Filesize

    120KB

  • memory/4980-135-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB