Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31-03-2023 01:27

General

  • Target

    vddsc.exe

  • Size

    5.8MB

  • MD5

    e7a69210f26c7944b6e267d0d73af320

  • SHA1

    cc03fe693690e4f45a7cca31782292f69e505801

  • SHA256

    64b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2

  • SHA512

    44345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07

  • SSDEEP

    98304:udcR2OyrVRPLlO/otpGnOYwxR7hv88+MqgtJjKniUDsMsqAnqCN7hm:ueVyrLg/onGl9pMbtJjKiOpAqCN7h

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vddsc.exe
    "C:\Users\Admin\AppData\Local\Temp\vddsc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1560-54-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/1560-55-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/1560-56-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/1560-57-0x0000000000400000-0x0000000000D10000-memory.dmp
    Filesize

    9.1MB