Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 16:41

General

  • Target

    2858fe3c2d48e70fe1e1f4e52cd7be093bb4598b6d7fd2c06345e66d0b283107.exe

  • Size

    204KB

  • MD5

    5caa359a79e62df1b000c5801b7eb08e

  • SHA1

    6cc0cd88dc631ee91b5b143c32681eb61deba62c

  • SHA256

    2858fe3c2d48e70fe1e1f4e52cd7be093bb4598b6d7fd2c06345e66d0b283107

  • SHA512

    d066ac3c4f17c52b3f0d4ac582cb4f81af0d078312bb89c738229df3ce7f8c710dc9d9cb4b5aeff77147ee86887f291614ea6c806130cedea4243d233eac4833

  • SSDEEP

    3072:c84t3834OCt4iCSIAql7m3NLRqZ234OCt4iCSIAql7m3NpK8J:c8O8oIACENLpoIACENp7

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2858fe3c2d48e70fe1e1f4e52cd7be093bb4598b6d7fd2c06345e66d0b283107.exe
    "C:\Users\Admin\AppData\Local\Temp\2858fe3c2d48e70fe1e1f4e52cd7be093bb4598b6d7fd2c06345e66d0b283107.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads