Analysis

  • max time kernel
    163s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 08:47

General

  • Target

    5aac6af8e879ddb0343f7111fa77279d8604d1832de870e722a15c1873959c83.exe

  • Size

    84KB

  • MD5

    7cf65ed2607bd24d7bf576ea026cf8a6

  • SHA1

    42b65610c4b7fd229676c63b84b395df7714eb21

  • SHA256

    5aac6af8e879ddb0343f7111fa77279d8604d1832de870e722a15c1873959c83

  • SHA512

    a39708b137291c43e3d4428f4a76626fce6cad82a7cedde07a2cb4dce9d5cc83b8c0278852858d754cf60f96479f87330c08d6949efc8a6718491bc5f0196233

  • SSDEEP

    1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUj:5m8nBjTmbxRBRN6WYiKqVo6Zj

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2432
      • C:\Users\Admin\AppData\Local\Temp\5aac6af8e879ddb0343f7111fa77279d8604d1832de870e722a15c1873959c83.exe
        "C:\Users\Admin\AppData\Local\Temp\5aac6af8e879ddb0343f7111fa77279d8604d1832de870e722a15c1873959c83.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3452

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads