Analysis

  • max time kernel
    117s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 23:21

General

  • Target

    19155d199b2c65813d733bd4d4c32672.exe

  • Size

    62KB

  • MD5

    19155d199b2c65813d733bd4d4c32672

  • SHA1

    5dbb80733fd9a3e3c7f57821a77acbed0c1838ea

  • SHA256

    883d6b046f2c84c462bcc788377ae35caf4fcea58b512f2e3e552357c1be82a1

  • SHA512

    ca0ad2a874ede1f54d58e75ba2f60d44a825320f5eff813b90618bad00eb1bf328ca6dcc62361d94377d305cd735017753a2cf24d5e0812b4a8cf4894e3fdae3

  • SSDEEP

    768:DZNEVIDpRCBeOJvxgQq+4fJ24FYHAhVbqOJluGLP5R70CXcg4jnkCouFO5Jl:MID8LxgR+Q29HubbjrvJ4rroug5Jl

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19155d199b2c65813d733bd4d4c32672.exe
    "C:\Users\Admin\AppData\Local\Temp\19155d199b2c65813d733bd4d4c32672.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2908-1-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2908-0-0x0000000000230000-0x0000000000233000-memory.dmp

    Filesize

    12KB

  • memory/2908-6-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB