Analysis

  • max time kernel
    37s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 14:17

General

  • Target

    98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe

  • Size

    77KB

  • MD5

    a268610d2eb87a81896bd7bf1a1848b0

  • SHA1

    9e46f029d5da7e9693e8f652b99753ab4702c356

  • SHA256

    98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d

  • SHA512

    af5542650918bc0d98f3d93e8ff1b647c396475386bc1be366258f9b37d3ac71c9c458efd6e7edba8ccd2f295d7425d4c3497e8f92ee4989e92953beeb5bd922

  • SSDEEP

    1536:TO+AZhCZFcsifjE0SJIB/6pCypfoe6WH/RgbZ:TO3ZhHsio0tBGCzoReZ

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe
    "C:\Users\Admin\AppData\Local\Temp\98be5324d3bbbd311e3258d3512b0727a475b4ab51c358c281efe6deb7f1e87d.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1652
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads