Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 05:35

General

  • Target

    d457b15dfcdd6669d60af6d96f56757674b6f0fbba11999f76f47e03bd635d09.exe

  • Size

    10.9MB

  • MD5

    41b99b0770f01afbd80481fb6f811bcc

  • SHA1

    58ee2fb1672b3af2db7997bb91cf3ab138d801e1

  • SHA256

    d457b15dfcdd6669d60af6d96f56757674b6f0fbba11999f76f47e03bd635d09

  • SHA512

    f9642a06e797992423b3d93785d175b081637b691c41d3f4a35dfd2860aa83cb967c4ceeace86a61e524f1ef674d1af1fab1de8e82ca45b11254cb666b78b08e

  • SSDEEP

    98304:BFS5S20uKttNYdJpKEiZGZBRA5RAWktxhI:B8qLSpXiI/C5CbhI

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d457b15dfcdd6669d60af6d96f56757674b6f0fbba11999f76f47e03bd635d09.exe
    "C:\Users\Admin\AppData\Local\Temp\d457b15dfcdd6669d60af6d96f56757674b6f0fbba11999f76f47e03bd635d09.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\d457b15dfcdd6669d60af6d96f56757674b6f0fbba11999f76f47e03bd635d09.exe
      C:\Users\Admin\AppData\Local\Temp\d457b15dfcdd6669d60af6d96f56757674b6f0fbba11999f76f47e03bd635d09.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3252

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads