Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:20

General

  • Target

    04504f2d8f7b432b176195ff4035084f.exe

  • Size

    1.4MB

  • MD5

    04504f2d8f7b432b176195ff4035084f

  • SHA1

    c828ccf91532b312c070363f3fbcdddc21c04cd1

  • SHA256

    5c155a2f7be89c91a6529222abd447dac6072eee4ef511ddba2df93e7d711ada

  • SHA512

    117a314b6850f56b4546c93e20368d2a6034538fc2734d7d57eb8455a007d6eb08398e1fc68988e7dbf4986a069cff42bcee073008c2e5800483ef2523dc8912

  • SSDEEP

    24576:yb5Eie3VHTtEhibbDncSYhUbHZB8Cfl8dbbWMnQdvpsRnVDZgjG:yb55e3VH9jncNO5B8Cf6bWfxiLaa

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04504f2d8f7b432b176195ff4035084f.exe
    "C:\Users\Admin\AppData\Local\Temp\04504f2d8f7b432b176195ff4035084f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2572-0-0x0000000000400000-0x0000000000B11000-memory.dmp

    Filesize

    7.1MB

  • memory/2572-1-0x00000000001B0000-0x00000000001B2000-memory.dmp

    Filesize

    8KB

  • memory/2572-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2572-3-0x0000000000400000-0x0000000000B11000-memory.dmp

    Filesize

    7.1MB

  • memory/2572-4-0x0000000000400000-0x0000000000B11000-memory.dmp

    Filesize

    7.1MB

  • memory/2572-5-0x0000000000400000-0x0000000000B11000-memory.dmp

    Filesize

    7.1MB

  • memory/2572-6-0x00000000001B0000-0x00000000001B2000-memory.dmp

    Filesize

    8KB

  • memory/2572-7-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB