Analysis

  • max time kernel
    141s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 12:10

General

  • Target

    ddd2e40f494855d4905395a7d989cf93.exe

  • Size

    448KB

  • MD5

    ddd2e40f494855d4905395a7d989cf93

  • SHA1

    d917f717be9df884c7f06987fb51db5167e8e0c5

  • SHA256

    696c2ad4e3eb24171bc18b9502e5224c2817f6fc1d5d1646f497116f766ebc0d

  • SHA512

    fac76974be904e370fb2a6e9134a81329d1d55e2f4b540e181dcfedc6f15b29c1840c5431e5c8329590067eb8c832a824e7897030b2ab78a22e922216c0db32c

  • SSDEEP

    12288:QboBb/W9ANGBAFb5i0P6HfewKQLYg0yCx:4xBAiAHwfz

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddd2e40f494855d4905395a7d989cf93.exe
    "C:\Users\Admin\AppData\Local\Temp\ddd2e40f494855d4905395a7d989cf93.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4304-3-0x0000000002250000-0x0000000002282000-memory.dmp
    Filesize

    200KB

  • memory/4304-11-0x00000000022C0000-0x00000000022EF000-memory.dmp
    Filesize

    188KB

  • memory/4304-9-0x0000000002290000-0x00000000022BE000-memory.dmp
    Filesize

    184KB

  • memory/4304-8-0x00000000022C0000-0x00000000022EF000-memory.dmp
    Filesize

    188KB

  • memory/4304-7-0x0000000000640000-0x0000000000670000-memory.dmp
    Filesize

    192KB

  • memory/4304-77-0x00000000022C0000-0x00000000022EF000-memory.dmp
    Filesize

    188KB