Analysis

  • max time kernel
    135s
  • max time network
    61s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/01/2023, 22:34

General

  • Target

    uNITROFREE369r.exe

  • Size

    8.3MB

  • MD5

    528b2c16ff31f08068fabff1ee9b01b3

  • SHA1

    72ffb2ac249b22fad13eab0129095f07a3c283f2

  • SHA256

    60ee06af06c84a181d39fc7e6980c990ea1aec1c0cb574acdf86ca0081ec01b9

  • SHA512

    36d9432c4431fd647f00457ff7fcd53a23c573ef41422fbf450d035640bd7fefe959dc8f0e23861e6f05b9523a7b2f1608dbc1b014004663b5ca0b846429062c

  • SSDEEP

    196608:07FV4lHlWAmtBQdoIQPZzcRyDeXBRODlcDHSU8N:6IuAm7K2GIDbcbz

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\uNITROFREE369r.exe
    "C:\Users\Admin\AppData\Local\Temp\uNITROFREE369r.exe"
    1⤵
      PID:2972
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4544

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2972-118-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-119-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-121-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-120-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-122-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-123-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-124-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-125-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-126-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-127-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-128-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-129-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-130-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-131-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-132-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-133-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-134-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-136-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-137-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-138-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-139-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-135-0x0000000077220000-0x00000000773AE000-memory.dmp

        Filesize

        1.6MB

      • memory/2972-140-0x0000000000400000-0x0000000001724000-memory.dmp

        Filesize

        19.1MB

      • memory/2972-141-0x0000000000400000-0x0000000001724000-memory.dmp

        Filesize

        19.1MB