Analysis

  • max time kernel
    37s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 01:37

General

  • Target

    36c15a66cb83483e040e157f74debf3d5d96e08324de0a3ce35ee3a30a65ab41.exe

  • Size

    84KB

  • MD5

    0afbff26f182bf4ce420bd8ddfcd3828

  • SHA1

    a6086a615d77ae02709e50ce96be8e6a3a563b0e

  • SHA256

    36c15a66cb83483e040e157f74debf3d5d96e08324de0a3ce35ee3a30a65ab41

  • SHA512

    cd76cc0c9fbeee23652808beabf992889ac8935369ab7862a9a867e19cc566ea64be1f28a0c538380cd73d5d9c76903cf23e5450a1195f52862517220e94160e

  • SSDEEP

    1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUH:5m8nBjTmbxRBRN6WYiKqVo6ZH

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1412
      • C:\Users\Admin\AppData\Local\Temp\36c15a66cb83483e040e157f74debf3d5d96e08324de0a3ce35ee3a30a65ab41.exe
        "C:\Users\Admin\AppData\Local\Temp\36c15a66cb83483e040e157f74debf3d5d96e08324de0a3ce35ee3a30a65ab41.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1472

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads