Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 00:29

General

  • Target

    4678b9692aa2e316e3cca8db2fe3d414.exe

  • Size

    706KB

  • MD5

    4678b9692aa2e316e3cca8db2fe3d414

  • SHA1

    afb9659fb8dfc785c8d126b5d7324864948cde04

  • SHA256

    dc25b560f7131e431e872cfbaeb47a34dd2e11a6fc2040535e232be307be687e

  • SHA512

    2368f459bbc4f6a43ae8b641fe7b45b589c263e3d406b0274742f8d97192aa2bd5fe8b90e4e6fc3cc940a2b01bce98a4763d544fd6d2a2fa0a7883a1e4091e32

  • SSDEEP

    12288:/jumzzhnl5Cvm/Zh6cLtyXDEmwszL8H+IYjYakyMWmQsGIIagxc0IKtcySim6tR7:rp3Cvm/Zh6cByXwsf8H0nMWmQsIagc09

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4678b9692aa2e316e3cca8db2fe3d414.exe
    "C:\Users\Admin\AppData\Local\Temp\4678b9692aa2e316e3cca8db2fe3d414.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    PID:3948

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3948-0-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/3948-2-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB