Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 10:58

General

  • Target

    41d823f810b22883bf9fdeb7f3ddfabd3d5426afa5ebd4580184db7db41dc940.exe

  • Size

    320KB

  • MD5

    a2e1d74600cc74eab86e12228ce4e760

  • SHA1

    62f88916d9473d5b0b937088072f85e2fe802b98

  • SHA256

    41d823f810b22883bf9fdeb7f3ddfabd3d5426afa5ebd4580184db7db41dc940

  • SHA512

    5c99b15b8f39320489123d906b0d2642c077f6b4075a45df06f244c5a516c94f2146087a9a2dc6d32c126b8ef400b3de298a2955fb6a5a51222beb45dfe86083

  • SSDEEP

    6144:Yu8rwupH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:D0wuh2EB0NxDIBuOFe7/uT

Score
8/10

Malware Config

Signatures

  • Contacts a large (505) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d823f810b22883bf9fdeb7f3ddfabd3d5426afa5ebd4580184db7db41dc940.exe
    "C:\Users\Admin\AppData\Local\Temp\41d823f810b22883bf9fdeb7f3ddfabd3d5426afa5ebd4580184db7db41dc940.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4828-132-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4828-133-0x00000000001E0000-0x00000000001FE000-memory.dmp

    Filesize

    120KB

  • memory/4828-134-0x00000000001E0000-0x00000000001FE000-memory.dmp

    Filesize

    120KB