Analysis

  • max time kernel
    48s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 08:42

General

  • Target

    9696cfd75e346fc3c61cfccfb09c6ef5fae70e12b18e6aa18a641bebbce754d7.exe

  • Size

    84KB

  • MD5

    3e17a6f3e30692053775be3a3251cab2

  • SHA1

    38604ce9e4529e3c938ae6ad43d45780f8a29be0

  • SHA256

    9696cfd75e346fc3c61cfccfb09c6ef5fae70e12b18e6aa18a641bebbce754d7

  • SHA512

    4b32907d4708a4f38fd066b35c08303d5ffd1dee8f93465af5b2cded81d13b49c3a771c5bc4f03b4b0a8451b61276161a06ad5b061de7248a27641e7e45a7b6a

  • SSDEEP

    1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EU0:5m8nBjTmbxRBRN6WYiKqVo6Z0

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\9696cfd75e346fc3c61cfccfb09c6ef5fae70e12b18e6aa18a641bebbce754d7.exe
        "C:\Users\Admin\AppData\Local\Temp\9696cfd75e346fc3c61cfccfb09c6ef5fae70e12b18e6aa18a641bebbce754d7.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1536

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads