Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2024 15:44

General

  • Target

    st.exe

  • Size

    127KB

  • MD5

    895e2eda726065f323f3723a2d1d8c23

  • SHA1

    390025bf551ef736230a8a2cb4a27cf1d2b9b238

  • SHA256

    12f29ea6403f9c16a3f498d36eee4263465176c88e0b9f7a7e70e00a7b175bff

  • SHA512

    51ed30455aa4a733b5984b7733100eed1a99caf757f206013887ff1af2956480161f40999c2be9ee3c7e0f42befcdfbceebe9caad27afd01a451116580e85299

  • SSDEEP

    3072:JXfeX7/A1ZLn9oxFvfZo+s5trGjq/MLeU/fMr:8/2ZLnm3vfZo+u9GjsMKUc

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\st.exe
    "C:\Users\Admin\AppData\Local\Temp\st.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3336

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3336-0-0x00007FF7D4F60000-0x00007FF7D4F89000-memory.dmp
    Filesize

    164KB

  • memory/3336-1-0x00007FF7D4F60000-0x00007FF7D4F89000-memory.dmp
    Filesize

    164KB

  • memory/3336-2-0x0000020EFBB20000-0x0000020EFBB42000-memory.dmp
    Filesize

    136KB

  • memory/3336-14-0x0000020EFBB20000-0x0000020EFBB42000-memory.dmp
    Filesize

    136KB

  • memory/3336-27-0x0000020EFBB20000-0x0000020EFBB42000-memory.dmp
    Filesize

    136KB