Analysis

  • max time kernel
    41s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2023 12:51

General

  • Target

    50f363c8427dc1461e394915d7b53d55c98b603e.exe

  • Size

    328KB

  • MD5

    904059163a2bd48a60ccd4d9a4fa8e59

  • SHA1

    50f363c8427dc1461e394915d7b53d55c98b603e

  • SHA256

    6d94eda5ece16d9c501b722a0f3236646c4fb8644d5723aba5145f68f3a22e43

  • SHA512

    c24226e41b32ffd17258ebd77f7594a8ba37888dc34522636838a715d7e2a063423337f4b8353d8cae8ab8905b3bd4b8e1b39972241c93585571fe994d0e7586

  • SSDEEP

    6144:vuE3iqxmhVG2CcB5W6RTgeZSPoz3Yy7LjobxbdVi:hidhVGUB5W6RMeZBRXMxZA

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50f363c8427dc1461e394915d7b53d55c98b603e.exe
    "C:\Users\Admin\AppData\Local\Temp\50f363c8427dc1461e394915d7b53d55c98b603e.exe"
    1⤵
    • Drops file in System32 directory
    PID:1636

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1636-54-0x0000000075071000-0x0000000075073000-memory.dmp

    Filesize

    8KB