Analysis

  • max time kernel
    19s
  • max time network
    6s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 08:19

General

  • Target

    ae0acc6f7c5020c02dec716c5f84d433732d25aeab2a288f9c96165a407967fc.exe

  • Size

    758KB

  • MD5

    c058c4d86beda125a20cabdaa655cf15

  • SHA1

    e50ead8cbe5153a0fe7de6b3cfed9f60a5f2f29b

  • SHA256

    ae0acc6f7c5020c02dec716c5f84d433732d25aeab2a288f9c96165a407967fc

  • SHA512

    bd309b5810ba0c037b15da1f6f2f59f5b985f18fedffca9d29ff70c2879cb51e7ccda21cdb05dd82709923cf71c5dc3e5b126424af57ad2b93a3ec3df9cb009e

  • SSDEEP

    12288:gAHiKgHwCXQXp1/jpBfbdIvGaYYeRNi66a3W4MS5Hhc834w3+78LseGbD4nrI1o:gACK2Q7jDfuM1ZhLc83fPL1GKIS

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae0acc6f7c5020c02dec716c5f84d433732d25aeab2a288f9c96165a407967fc.exe
    "C:\Users\Admin\AppData\Local\Temp\ae0acc6f7c5020c02dec716c5f84d433732d25aeab2a288f9c96165a407967fc.exe"
    1⤵
      PID:2264
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\document.doc" /o ""
        2⤵
          PID:3380
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7za.exe" x -pHejudevuRuTaCh -y rdata
          2⤵
            PID:4944
            • C:\Users\Admin\AppData\Local\Temp\7za.exe
              C:\Users\Admin\AppData\Local\Temp\7za.exe x -pHejudevuRuTaCh -y rdata
              3⤵
                PID:4088
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c rename "C:\Users\Admin\AppData\Local\Temp\text" 7za.exe
              2⤵
                PID:4264
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c rename "C:\Users\Admin\AppData\Local\Temp\text" 7za.exe
                2⤵
                  PID:4356

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\7za.exe

                Filesize

                28KB

                MD5

                a8c2114ee24aa5faba7c8bde0be437aa

                SHA1

                f50e4ad3491938384625ca9491839a9ee3e8c086

                SHA256

                18c95250893ba295f9a2e76cc1d495a3345c7a096ecf389b484070882502bb90

                SHA512

                18d2133c940a787179c93dcc0dfdf3f3d43fbe83089dde379f20e3d9d3bcb69bb207eea120d486f4ecc9ff194c2a9692b0c94b6b8861725825635db845b15528

              • C:\Users\Admin\AppData\Local\Temp\rdata

                Filesize

                2KB

                MD5

                e971d9deb481b71ea7f1b03add8dfbaa

                SHA1

                82c0ad5d21105681ccf174ed7cddf675e6b4624c

                SHA256

                3c3d8d584e4e49adb638d85056730af5fe8ae52e7448114df5fab6feb8829a4c

                SHA512

                da1f9c92d70c4a05bf54f5d12383d6520b18382923918bb420270cf192c61545fb2fddc589bcf4676b2582d4b9c6a611ec59db596a05cdfc932ff2073a731edb

              • C:\Users\Admin\AppData\Local\Temp\text

                Filesize

                23KB

                MD5

                771040f1886ca6450824dce104d14676

                SHA1

                3ab104a4ed44dc1c4aca86dd3d2415c90d0455bd

                SHA256

                51e6b73d2561a379d157a54345b7d657e8938f4f888442d83eace56faafe9877

                SHA512

                7fae0c03ad3768113799aa6e93fa2791a9a58088f009c081c747e8a7fe926e1232a0966397f31a73bbee39f4fd2477fa1612f0182642a23440c701e3ab5859d6