Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 05:37

General

  • Target

    52ad516d0101f115d5ad8da499aaa58d.exe

  • Size

    912KB

  • MD5

    52ad516d0101f115d5ad8da499aaa58d

  • SHA1

    7ea7d8c2e4419b47856d630059621afe079a6475

  • SHA256

    a5e46357cfa180dbb2b5e023ea54e692845a4b25548081b9dbf5fdf8551fb194

  • SHA512

    07d7329d51a46d42f218cbe45f935b43470df1cea339f966f8690a38df45b882255849e4261ea2582382f670149045e9b1794f8d2839a3d0d4c4d5bde5f06dfe

  • SSDEEP

    12288:1TP4g0Qjh4nKlCiDYtIMNNUC5rO/M/HnNX1cj2vLkjCm5BWL:1T3Z/lpYtjNjRXvR5jk+

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52ad516d0101f115d5ad8da499aaa58d.exe
    "C:\Users\Admin\AppData\Local\Temp\52ad516d0101f115d5ad8da499aaa58d.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1952-0-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/1952-1-0x0000000002280000-0x0000000002281000-memory.dmp

    Filesize

    4KB

  • memory/1952-3-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/1952-4-0x0000000002280000-0x0000000002281000-memory.dmp

    Filesize

    4KB