Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 00:13

General

  • Target

    c4304e471fdf24b2eb4a6187bca79eb4a21283312534ef0d0607966840e35817.exe

  • Size

    315KB

  • MD5

    67a9089311ed4a418b2050fbf74f46e4

  • SHA1

    2d04481a3ff30be087d3a606acbb4932601153e4

  • SHA256

    c4304e471fdf24b2eb4a6187bca79eb4a21283312534ef0d0607966840e35817

  • SHA512

    3c8d95709dd5fa523e01cb1b4f54b746b9a75189cf8fec53758397f0bd74f3ee6037e6034275b91ebb103947617c6789755b9c8158037d3528a89b3f99e6c0c5

  • SSDEEP

    6144:kXDXL0BvnjbJDB7VHMkzQB9qnrOket/3Rn:yb0BPjb37ykeur9ex

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4304e471fdf24b2eb4a6187bca79eb4a21283312534ef0d0607966840e35817.exe
    "C:\Users\Admin\AppData\Local\Temp\c4304e471fdf24b2eb4a6187bca79eb4a21283312534ef0d0607966840e35817.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4960

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4960-132-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4960-133-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB