Analysis

  • max time kernel
    88s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 22:02

General

  • Target

    780faf9b81ccad81739efd88778fcb7a707ac7810b11d7ab388aa41582407711.exe

  • Size

    76KB

  • MD5

    148766fff02a98475fe51ffdf777dbd7

  • SHA1

    2002a87edc3d610f58a85fb4b992927ed44fdae6

  • SHA256

    780faf9b81ccad81739efd88778fcb7a707ac7810b11d7ab388aa41582407711

  • SHA512

    ffa878225f1fe84cea2ffa498f886ae6f5543517d977bde2fdd770d3a601c7c9f05b96239f63b536023b0b505a96006812003de20c39a51db725ee0c394e967c

  • SSDEEP

    1536:HNdnBWyqhAG1fRCZ3HTAMXMEa2Xm+7vySQYUPI+pjVrs2ryrd1vUQuq6:H31YX1clHzC2WOatYUw+Hs2qo

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 8 IoCs
  • Modifies registry class 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\780faf9b81ccad81739efd88778fcb7a707ac7810b11d7ab388aa41582407711.exe
    "C:\Users\Admin\AppData\Local\Temp\780faf9b81ccad81739efd88778fcb7a707ac7810b11d7ab388aa41582407711.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:2320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2320-132-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2320-133-0x00000000001E0000-0x00000000001FE000-memory.dmp

    Filesize

    120KB

  • memory/2320-134-0x00000000001E0000-0x00000000001FE000-memory.dmp

    Filesize

    120KB

  • memory/2320-135-0x00000000001E0000-0x00000000001FE000-memory.dmp

    Filesize

    120KB