Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 20:26

General

  • Target

    1bd16167607064738a8ce6bd149c0fe2.exe

  • Size

    55KB

  • MD5

    1bd16167607064738a8ce6bd149c0fe2

  • SHA1

    3d1c4821a7f270cfd3d7739cbe2fd63c60709a76

  • SHA256

    7f40366a40673332a59b8120badd9b8257877510ee226af550f3bcec6fe8548e

  • SHA512

    bb1464b8492646858784feb74228ca0e2a05daef72bcb822b64c755c05b09bf65c8c17c05e695ec876a21c81f5020eaf45ef14ce81aa2b20b3b421733b54a3ec

  • SSDEEP

    768:u1h7TzTBziifTeiZSVWihwEknh0L7OTLeNfQf351bcgBH5T9Zztj7CzrWB9+hd:0Z/nEkh8OTKNQmg5Tf9u8O

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bd16167607064738a8ce6bd149c0fe2.exe
    "C:\Users\Admin\AppData\Local\Temp\1bd16167607064738a8ce6bd149c0fe2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3924
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3420

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3420-2-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3420-3-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB

    • memory/3924-0-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/3924-1-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/3924-7-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/3924-6-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB