Analysis

  • max time kernel
    93s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 10:07

General

  • Target

    Suscribete a KuasaR/Unpark CPU/UnparkCPU.exe

  • Size

    40KB

  • MD5

    fff1cb2b6839220baff452540538cec9

  • SHA1

    4d4ffeedc7a431a6c36ee18311dfbd25db77c46d

  • SHA256

    0d2e3343a22dccf6fce94778e95b7d40e759ae6dfa9e2444f3ac01b50fa948d1

  • SHA512

    faa45af2def0ea3e5602b90076a661dfdf39080e9a062e36e8f1d5d89b83f11414698ec51396d8fb22c3ec1e322791e8a58a4de584814ace8805297fc68dabc6

  • SSDEEP

    384:zbhoAFk8wrUyZJ1KQDo0vwtokw7wq6uOHciQyGqlNJnORKwA3EM43jx+Z+zGw/gS:P2jDc8oqv++ztI7WEwyO8oYzYcHe+m

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Suscribete a KuasaR\Unpark CPU\UnparkCPU.exe
    "C:\Users\Admin\AppData\Local\Temp\Suscribete a KuasaR\Unpark CPU\UnparkCPU.exe"
    1⤵
      PID:2036

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2036-133-0x0000000000E90000-0x0000000000EA0000-memory.dmp

      Filesize

      64KB

    • memory/2036-134-0x0000000005E20000-0x00000000063C4000-memory.dmp

      Filesize

      5.6MB

    • memory/2036-135-0x0000000005870000-0x0000000005902000-memory.dmp

      Filesize

      584KB

    • memory/2036-136-0x0000000005850000-0x000000000585A000-memory.dmp

      Filesize

      40KB

    • memory/2036-137-0x0000000005800000-0x0000000005810000-memory.dmp

      Filesize

      64KB

    • memory/2036-138-0x0000000005800000-0x0000000005810000-memory.dmp

      Filesize

      64KB

    • memory/2036-139-0x0000000005800000-0x0000000005810000-memory.dmp

      Filesize

      64KB

    • memory/2036-140-0x0000000005800000-0x0000000005810000-memory.dmp

      Filesize

      64KB