Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 23:26

General

  • Target

    59ae86c106d978af0a98618238e180b2.exe

  • Size

    77KB

  • MD5

    59ae86c106d978af0a98618238e180b2

  • SHA1

    8d55055f4ed90c22f04167eb1733778e4357eee0

  • SHA256

    40e269272dccedad8b4d81bb6eb9f74022182c9ae9ab9b399fe128a53762e0e1

  • SHA512

    1a3a43d70864cdf9576b1b4ccba05f6951d1f87bbec481bbaf54ad857a3a989ed879827e0fa965bfa1fd249c6ab70c45349817ad71ae4f016ec465f642ce706a

  • SSDEEP

    1536:acV6HGavqgaON4ck4iOQ3SDLt4pSXdQbHZzix65FbVHkr:acVqnv0JOQ38t4AXdQbHUmBBE

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3440
      • C:\Users\Admin\AppData\Local\Temp\59ae86c106d978af0a98618238e180b2.exe
        "C:\Users\Admin\AppData\Local\Temp\59ae86c106d978af0a98618238e180b2.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1932

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1932-0-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1932-1-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/1932-7-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1932-8-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/3440-3-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3440-4-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB