Analysis

  • max time kernel
    300s
  • max time network
    301s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    23-05-2023 21:09

General

  • Target

    Alien Isolation V13.01.2019 Trainer +5 MrAntiFun.exe

  • Size

    794KB

  • MD5

    fee21ac3481dd6a48d5f3dce727fe2e4

  • SHA1

    cbc0ae78c30bc9998c3cb6d65e86c24e17c8bbf3

  • SHA256

    f84c6bbb4a1a86e9e6a3790008eb615e2ffae58d41ffa8965e148fd17d63127a

  • SHA512

    6746a16c8d2d77720f2f6820e4840be7b2d58e2366aebbc60e2580466a5a7a2174a9193b72f1012fd123fe562b72606c05f901a877b6281bd1a484de21ffb3d8

  • SSDEEP

    12288:65jLjqux1ANozInNcOOjCHieL1GbgZTmNRp03Vng/6Bl5JX5VV9:61n1A+NnWH7xGbiSn0ZFlfX5D9

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Alien Isolation V13.01.2019 Trainer +5 MrAntiFun.exe
    "C:\Users\Admin\AppData\Local\Temp\Alien Isolation V13.01.2019 Trainer +5 MrAntiFun.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4948-133-0x0000000000980000-0x0000000001980000-memory.dmp

    Filesize

    16.0MB

  • memory/4948-134-0x00000000248E0000-0x0000000024E84000-memory.dmp

    Filesize

    5.6MB

  • memory/4948-135-0x00000000243D0000-0x0000000024462000-memory.dmp

    Filesize

    584KB

  • memory/4948-136-0x0000000024340000-0x000000002434A000-memory.dmp

    Filesize

    40KB

  • memory/4948-137-0x0000000024640000-0x00000000246A6000-memory.dmp

    Filesize

    408KB

  • memory/4948-138-0x0000000021D20000-0x0000000021D30000-memory.dmp

    Filesize

    64KB

  • memory/4948-141-0x0000000021D20000-0x0000000021D30000-memory.dmp

    Filesize

    64KB

  • memory/4948-142-0x0000000021D20000-0x0000000021D30000-memory.dmp

    Filesize

    64KB

  • memory/4948-143-0x0000000021D20000-0x0000000021D30000-memory.dmp

    Filesize

    64KB