Analysis

  • max time kernel
    1s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 23:28

General

  • Target

    407b401a625617b1da77bc2b7e02fb069b33aa0ccf972dafcb22e0630f4f2211.exe

  • Size

    84KB

  • MD5

    5361a9fface530380800fba871de141c

  • SHA1

    ee93e92167248297acfbb0e6bf2ee44a213c1f9e

  • SHA256

    407b401a625617b1da77bc2b7e02fb069b33aa0ccf972dafcb22e0630f4f2211

  • SHA512

    c09a48267069f85ffdb60cd0e82e5b646453c5513cda8aa717d5b2c6227ec5f61209adda9cb1bb99ae4e7c801aa50b73b08075f650d1642cd4ff909bff53dbe9

  • SSDEEP

    1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUP:5m8nBjTmbxRBRN6WYiKqVo6ZP

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\407b401a625617b1da77bc2b7e02fb069b33aa0ccf972dafcb22e0630f4f2211.exe
        "C:\Users\Admin\AppData\Local\Temp\407b401a625617b1da77bc2b7e02fb069b33aa0ccf972dafcb22e0630f4f2211.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1728

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads