Analysis

  • max time kernel
    1790s
  • max time network
    1748s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231129-en
  • resource tags

    arch:x64arch:x86image:win11-20231129-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-12-2023 17:56

General

  • Target

    The-MALWARE-Repo-master/Email-Worm/Axam.a.exe

  • Size

    11KB

  • MD5

    0fbf8022619ba56c545b20d172bf3b87

  • SHA1

    752e5ce51f0cf9192b8fa1d28a7663b46e3577ff

  • SHA256

    4ae7d63ec497143c2acde1ba79f1d9eed80086a420b6f0a07b1e2917da0a6c74

  • SHA512

    e8d44147609d04a1a158066d89b739c00b507c8ff208dac72fdc2a42702d336c057ae4b77c305f4ccdfe089665913098d84a3160a834aaebe41f95f4b4bfddeb

  • SSDEEP

    192:33K8Vn5fAIBkPA9tQdEnhAv+mKqh1RwE9gCOMv8eIry2aZoa5qq/:33X54IB8SCY2W3qmSgaIrTDSqq/

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Axam.a.exe
    "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Email-Worm\Axam.a.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Axam.exe

    Filesize

    11KB

    MD5

    0fbf8022619ba56c545b20d172bf3b87

    SHA1

    752e5ce51f0cf9192b8fa1d28a7663b46e3577ff

    SHA256

    4ae7d63ec497143c2acde1ba79f1d9eed80086a420b6f0a07b1e2917da0a6c74

    SHA512

    e8d44147609d04a1a158066d89b739c00b507c8ff208dac72fdc2a42702d336c057ae4b77c305f4ccdfe089665913098d84a3160a834aaebe41f95f4b4bfddeb

  • memory/3204-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3204-10-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB