Analysis

  • max time kernel
    138s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 08:04

General

  • Target

    aa8704ce28036a267019c5923227f1b489c0e94963f89ab24ceab682da063207.exe

  • Size

    26KB

  • MD5

    7253cd825ff74cb5279b7ec1f4e77571

  • SHA1

    f0f3d3d892bc3fe7492d645ce378053f75355588

  • SHA256

    aa8704ce28036a267019c5923227f1b489c0e94963f89ab24ceab682da063207

  • SHA512

    e5f7b4dcf4566e35606675aec212ca556b31a9fc0cab420c73fa48f1948a877140027fbfeb5dd66b736346522651b775c828fe060d5bbae400928d8caf6e1c9e

  • SSDEEP

    384:gGJHjz9NNKBDFS1o7DNXF0p7obB6XU0t5nnbQ7QjYJuilSsDTbyXoSRu:gGJH7IBDFScXMKWZnqDSW6Pu

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2692
      • C:\Users\Admin\AppData\Local\Temp\aa8704ce28036a267019c5923227f1b489c0e94963f89ab24ceab682da063207.exe
        "C:\Users\Admin\AppData\Local\Temp\aa8704ce28036a267019c5923227f1b489c0e94963f89ab24ceab682da063207.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4596

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4596-132-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/4596-133-0x00000000005B0000-0x00000000005CA000-memory.dmp

      Filesize

      104KB