Analysis

  • max time kernel
    192s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:18

General

  • Target

    8365848645cd12977acc27c8bbcc3ae229a4009b861d5a90ab1eb723890edbfe.exe

  • Size

    87KB

  • MD5

    a2608bd58a6e5301cb5b0a981755a070

  • SHA1

    cf46f6f36f0677a50f0f474dbdf26f1e8c8981b4

  • SHA256

    8365848645cd12977acc27c8bbcc3ae229a4009b861d5a90ab1eb723890edbfe

  • SHA512

    b229efbc4f5d44218f74b080a7bc7df52a2f48c049fe2c57fbab555cbc1626b077543e8180daa97c4fe640f4b4444a70257bdc59992844e1f7db11aa0770879c

  • SSDEEP

    1536:YV1rjM/RdAnYmqEbQ5LppfDlTEfqscZHpjVrs2ryrd1vUQuqtkmaqb:QfMnGYmxbuZDlAfqXZHHs2qDkmaqb

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 52 IoCs
  • Modifies registry class 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8365848645cd12977acc27c8bbcc3ae229a4009b861d5a90ab1eb723890edbfe.exe
    "C:\Users\Admin\AppData\Local\Temp\8365848645cd12977acc27c8bbcc3ae229a4009b861d5a90ab1eb723890edbfe.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4432

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4432-132-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4432-133-0x00000000001E0000-0x00000000001FE000-memory.dmp
    Filesize

    120KB

  • memory/4432-134-0x00000000001E0000-0x00000000001FE000-memory.dmp
    Filesize

    120KB