Analysis

  • max time kernel
    107s
  • max time network
    4s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 01:37

General

  • Target

    0610e639b9879ce8ec954e538fbcf0a911fccc50cbae001d21d155c117ded74a.exe

  • Size

    84KB

  • MD5

    0b165e9c5ebe3805614b1a7676e84d81

  • SHA1

    833e2dd99de52b75ddcdacb0d990944bb35cb714

  • SHA256

    0610e639b9879ce8ec954e538fbcf0a911fccc50cbae001d21d155c117ded74a

  • SHA512

    2ea37e5d0fd5d5f25ab1a64dd57f53e9280b75e59804813ab37b9f23d3700aa17c3caa4f2b38cfa820f0cf534c339eb0ee33e7243ef4286c7e324bbf1956ebb7

  • SSDEEP

    1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUM:5m8nBjTmbxRBRN6WYiKqVo6ZM

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0610e639b9879ce8ec954e538fbcf0a911fccc50cbae001d21d155c117ded74a.exe
    "C:\Users\Admin\AppData\Local\Temp\0610e639b9879ce8ec954e538fbcf0a911fccc50cbae001d21d155c117ded74a.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1108
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2576

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads