Analysis

  • max time kernel
    182s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 12:33

General

  • Target

    e4892e40426bd4efe6f304acc01f24d3e142e1fced45ef44ea6cad7f524ce9db.exe

  • Size

    84KB

  • MD5

    c6b780b67ffd3a945eade4f2cf072ecc

  • SHA1

    27fba8bb8ebffed9f19109734e5ae8ca2aed1921

  • SHA256

    e4892e40426bd4efe6f304acc01f24d3e142e1fced45ef44ea6cad7f524ce9db

  • SHA512

    ebaac993fdaf89a8a14371f0d670d861caf68e5cd0f6cad789c4ed704bcc5505222b93a7892b9b4b9137ab992794d73fb456eae4206c1d811919899c6f982686

  • SSDEEP

    1536:qwm8nBjqs32bxPpBRy32Z6gJlyiKqVo6EUI:5m8nBjTmbxRBRN6WYiKqVo6ZI

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4892e40426bd4efe6f304acc01f24d3e142e1fced45ef44ea6cad7f524ce9db.exe
    "C:\Users\Admin\AppData\Local\Temp\e4892e40426bd4efe6f304acc01f24d3e142e1fced45ef44ea6cad7f524ce9db.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:800
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2020

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads