Analysis

  • max time kernel
    149s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 14:32

General

  • Target

    8720a1ab16bc568460b9fa2069b8f615.exe

  • Size

    3.5MB

  • MD5

    8720a1ab16bc568460b9fa2069b8f615

  • SHA1

    575339496e63575ff6b9fc544213c33ffd03ba84

  • SHA256

    3c99691da218ce57511f3a5204fd899e55744e97c0c8fd9b18a1163b7b46b430

  • SHA512

    75502b461973d1b40589ac1498410cac39928733fa6cfe6ae743d2be7a6b260e26d03a9c4d905c068d24ea055a0d85d9d6e055d0243ede541057f94182ea0239

  • SSDEEP

    49152:DA00JhrXn9+33znJkK5ZRPd6eliUeFHhLM2e5KFvHD7qqfmiqy9C:DA0T3zJjRl6tfYKFr7q/iq3

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8720a1ab16bc568460b9fa2069b8f615.exe
    "C:\Users\Admin\AppData\Local\Temp\8720a1ab16bc568460b9fa2069b8f615.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1540-0-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-1-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-3-0x0000000002A60000-0x0000000002A61000-memory.dmp

          Filesize

          4KB

        • memory/1540-5-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-6-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-7-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-8-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-9-0x0000000002A60000-0x0000000002A61000-memory.dmp

          Filesize

          4KB

        • memory/1540-10-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-11-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-12-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-13-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-14-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-15-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-16-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-17-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-20-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-21-0x0000000000400000-0x0000000000DE1000-memory.dmp

          Filesize

          9.9MB