Analysis

  • max time kernel
    356s
  • max time network
    417s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 17:57

General

  • Target

    6d77dca34129cb6561776280dc4e427dbb3dc393546296b1bb6e62f14f678c62.exe

  • Size

    666KB

  • MD5

    aab2ed3890b8b46618a12cdf36e5fdce

  • SHA1

    b0b81e6b2198f5b0019012cfc7579190fb997d68

  • SHA256

    6d77dca34129cb6561776280dc4e427dbb3dc393546296b1bb6e62f14f678c62

  • SHA512

    4c0c72d5c31aaa92295d66fa4819d7856ef447e6b1e4c50aca8eef44b23ad3a6dfb0f75550a3da0c0839ebcb968b74409b1e30e5304ed430cff909a3cd690e12

  • SSDEEP

    12288:lnIs/2hGI1yDovUZznE6++jgb21HfHfY4qMuyYcYp00:is/2hGI1y2oE6+ggbCHfHflGZcY00

Score
7/10

Malware Config

Signatures

  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d77dca34129cb6561776280dc4e427dbb3dc393546296b1bb6e62f14f678c62.exe
    "C:\Users\Admin\AppData\Local\Temp\6d77dca34129cb6561776280dc4e427dbb3dc393546296b1bb6e62f14f678c62.exe"
    1⤵
      PID:4068

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4068-132-0x00000000005C0000-0x000000000066C000-memory.dmp
      Filesize

      688KB

    • memory/4068-133-0x0000000005720000-0x0000000005CC4000-memory.dmp
      Filesize

      5.6MB

    • memory/4068-134-0x0000000005020000-0x00000000050B2000-memory.dmp
      Filesize

      584KB

    • memory/4068-135-0x0000000000B60000-0x0000000000B6A000-memory.dmp
      Filesize

      40KB

    • memory/4068-136-0x0000000000F90000-0x0000000001006000-memory.dmp
      Filesize

      472KB

    • memory/4068-137-0x0000000001010000-0x000000000102E000-memory.dmp
      Filesize

      120KB