Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2024 16:14

General

  • Target

    c1072c611f16ddeb1db87e622130a51a.exe

  • Size

    54KB

  • MD5

    c1072c611f16ddeb1db87e622130a51a

  • SHA1

    b37c8894c06d3c296b3f58f2c8ba3f357f4f6d3f

  • SHA256

    817dc004a2aac68cebe2fd8a0a3c382da4c5db2adc809c19a541facfdabe979d

  • SHA512

    d84ba8d3ef0cde34c97a1ca61b000303a24afe5e5d16a6ec553e9dba10e54ee31bc3f737ef09fad8ac8a9f6bd188e51cdcb8e179011ae9a42a0764c82e6c0f1d

  • SSDEEP

    768:nevFIYm0on6HGavZRtQffoaFNnioeQpYG0RN8vDckgRUgz9KjqQOYxwA3HyLt4pr:acV6HGavqgaCN4ck4iOQ3SDLt4pSXu

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1288
      • C:\Users\Admin\AppData\Local\Temp\c1072c611f16ddeb1db87e622130a51a.exe
        "C:\Users\Admin\AppData\Local\Temp\c1072c611f16ddeb1db87e622130a51a.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1908

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1288-1-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1288-5-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/1908-0-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1908-3-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/1908-14-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB