Analysis

  • max time kernel
    188s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 09:09

General

  • Target

    a2f7b333c85d76c6d9836b9361e4fae5730d009a6655ebe086543ccd5d9ddb5b.exe

  • Size

    84KB

  • MD5

    f260b920177ca38f9a3bac80b1feb4d6

  • SHA1

    2812696c1efbaa3bed69099e50b24a8dc816f857

  • SHA256

    a2f7b333c85d76c6d9836b9361e4fae5730d009a6655ebe086543ccd5d9ddb5b

  • SHA512

    9508b86713009ef95d06ee5f9d558b0accf33723c6a43aed9375aba5a1727295264688a088d4434b5741e7eb2a354ea520a31ebf04d779d80829f87c48864249

  • SSDEEP

    1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUd:5m8nBjTmbxRBRN6WYiKqVo6Zd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\a2f7b333c85d76c6d9836b9361e4fae5730d009a6655ebe086543ccd5d9ddb5b.exe
        "C:\Users\Admin\AppData\Local\Temp\a2f7b333c85d76c6d9836b9361e4fae5730d009a6655ebe086543ccd5d9ddb5b.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1580

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads