Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2024 17:05

General

  • Target

    416d9faa7fd327bbf399f6d024e00823.exe

  • Size

    1.1MB

  • MD5

    416d9faa7fd327bbf399f6d024e00823

  • SHA1

    9432c6bb604012c4a64da7d7e1b0da7c3befa8e7

  • SHA256

    a02160a1446643401646149cefef4fab77de2bf7d3f236f8289cc23fef00c46a

  • SHA512

    3ee72d26034f29c2c2bd31f0308e098dc442cf802725cce0740e058b1640f8a72e0680d6a03a3b4cbdb925f0e361fde2b60ee70aea1dac758747d4960a8dcb48

  • SSDEEP

    24576:cVpqXSBbfnWHg1NuunNuABl8BKIMkfx6IfO7iE+eQJ76IK1p14:cGXSt2g1AaV84EEIG7N+e0Xq14

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\416d9faa7fd327bbf399f6d024e00823.exe
        "C:\Users\Admin\AppData\Local\Temp\416d9faa7fd327bbf399f6d024e00823.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2516

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1184-2-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/1184-10-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

      Filesize

      24KB

    • memory/2516-1-0x0000000001DF0000-0x0000000001EE0000-memory.dmp

      Filesize

      960KB

    • memory/2516-0-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2516-5-0x0000000000400000-0x0000000000519000-memory.dmp

      Filesize

      1.1MB

    • memory/2516-6-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB