Analysis

  • max time kernel
    287s
  • max time network
    302s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 00:25

General

  • Target

    89f094e0f3ea50343d0c2a165fef66b56de2d4d451121d41d1d65b8fb74afc04.exe

  • Size

    173KB

  • MD5

    5d746c6be50fa4086b09e1e936675c33

  • SHA1

    d9bd444eb34d591561ab6f7e8fb46d1e52c6a50c

  • SHA256

    89f094e0f3ea50343d0c2a165fef66b56de2d4d451121d41d1d65b8fb74afc04

  • SHA512

    7e07f39ba7fbf9151cc8ad8aa8ae9bf064235e1d3cd0fc36c6a4b2fb0a1b319f64f4b27b3b6a2d8004b65ff6dcb3bc127bcc1097be7b2649e7235c58855c7cf1

  • SSDEEP

    3072:oSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSM:GrVeSM6L8qMkHRPw+hDHzOMpOo3WtTf

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:676
      • C:\Users\Admin\AppData\Local\Temp\89f094e0f3ea50343d0c2a165fef66b56de2d4d451121d41d1d65b8fb74afc04.exe
        "C:\Users\Admin\AppData\Local\Temp\89f094e0f3ea50343d0c2a165fef66b56de2d4d451121d41d1d65b8fb74afc04.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1224

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/676-138-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1224-133-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1224-134-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1224-136-0x00000000021C0000-0x00000000021F9000-memory.dmp

      Filesize

      228KB

    • memory/1224-135-0x0000000002160000-0x0000000002164000-memory.dmp

      Filesize

      16KB

    • memory/1224-137-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/1224-139-0x00000000021C0000-0x00000000021F9000-memory.dmp

      Filesize

      228KB

    • memory/1224-140-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB