Resubmissions

21-01-2023 18:14

230121-wvhcaadc52 10

21-01-2023 18:11

230121-wsllxsdc49 10

Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2023 18:11

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    dc36da0558ef0c16cd0cb8126af0f1f2

  • SHA1

    79453dae6980710622e51e18a305d0511a227719

  • SHA256

    ca871a9028d80e2b3d73a8fe07b9d1628b52e0f9163402a3ab3199f512a36ab1

  • SHA512

    985b27688a33036911de8476707cef04a5a46cd0d5efdf1fdfd345b0bc0fbadd09b65a712567f6944745c3b51a9c741ff4cb5120028ff32661a28c33f6d38e8c

  • SSDEEP

    49152:z3SF3DWhFU3AcOHYFv59oa1GOWJNg8ARSuSujF+N84:z3SF3cVSOa1GvNDySbuEN8

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/964-54-0x0000000075C81000-0x0000000075C83000-memory.dmp
    Filesize

    8KB

  • memory/964-55-0x000000000DBE0000-0x000000000DEDA000-memory.dmp
    Filesize

    3.0MB

  • memory/964-56-0x0000000000810000-0x000000000099A000-memory.dmp
    Filesize

    1.5MB

  • memory/964-57-0x000000000DBE0000-0x000000000DDA4000-memory.dmp
    Filesize

    1.8MB

  • memory/964-58-0x0000000000810000-0x000000000099A000-memory.dmp
    Filesize

    1.5MB