Analysis

  • max time kernel
    151s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 19:13

General

  • Target

    3c7c4c7029308887be367c3f41ee73a2060931384f9ca6cfb18d368769f10225.exe

  • Size

    64KB

  • MD5

    03f70014dbbcec29f7292815b04c0dc9

  • SHA1

    d23147117a32461d0afbd11a2ffa2113b5b6d34a

  • SHA256

    3c7c4c7029308887be367c3f41ee73a2060931384f9ca6cfb18d368769f10225

  • SHA512

    72cedb22232a13134675d3179f2710bc7b01fa74ceab3bbdd459d520da337fb1912421c23259f9b2eeab5f5187f914a7a0cfec21b00026b199e873749774d0e0

  • SSDEEP

    1536:1mLZM/LP4nEGomry9sjvSi2bk89V7MNY:1lLP4nEGomry+jvH2bl9V7MNY

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c7c4c7029308887be367c3f41ee73a2060931384f9ca6cfb18d368769f10225.exe
    "C:\Users\Admin\AppData\Local\Temp\3c7c4c7029308887be367c3f41ee73a2060931384f9ca6cfb18d368769f10225.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1416-55-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1416-54-0x0000000000220000-0x0000000000225000-memory.dmp

    Filesize

    20KB

  • memory/1416-56-0x00000000762D1000-0x00000000762D3000-memory.dmp

    Filesize

    8KB

  • memory/1416-57-0x0000000000220000-0x0000000000225000-memory.dmp

    Filesize

    20KB