Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 23:28

General

  • Target

    5d0a44a25c9f36284536e9f26e2dafeefd8320d80a51043d1a2a92a5f3f7b0d3.exe

  • Size

    84KB

  • MD5

    4917d72d54011648227354a9cafcfb90

  • SHA1

    a6680543af21ae41f897f1e75e3454a0d2a5e683

  • SHA256

    5d0a44a25c9f36284536e9f26e2dafeefd8320d80a51043d1a2a92a5f3f7b0d3

  • SHA512

    bb017e03ecd87b4762c53d10589481cecbae6944282790015803afa2a5270e34393149a6efe08c83fb7820f20fee8c383cccdcb5dee50aa536ad7a8608162ed5

  • SSDEEP

    1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUB:5m8nBjTmbxRBRN6WYiKqVo6ZB

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3056
      • C:\Users\Admin\AppData\Local\Temp\5d0a44a25c9f36284536e9f26e2dafeefd8320d80a51043d1a2a92a5f3f7b0d3.exe
        "C:\Users\Admin\AppData\Local\Temp\5d0a44a25c9f36284536e9f26e2dafeefd8320d80a51043d1a2a92a5f3f7b0d3.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4572

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads