Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 07:20

General

  • Target

    c8086a8c7ff96f20c01b589efa6b243c.exe

  • Size

    48KB

  • MD5

    c8086a8c7ff96f20c01b589efa6b243c

  • SHA1

    d71996fcbfc342433e6571efcfc44ec7e466d85f

  • SHA256

    2f5079bf88ed7a5a36fff2eeb493b3c4ea85e7e88a0c6a62e585ab029fa03b90

  • SHA512

    7493475c78760a0fa352e34aa8388c5ca5c4e86697023845657093172db24ddf3533aa12b65b40cfda0fb776b38ac1659fb2c110f67af312a171a3286f1c99aa

  • SSDEEP

    768:LY1aSM0waNQB++wNyZP9/dvs8Svz5Eorrw+HDkL9BhZEUf5jLY1NvWQt3cgVnjfN:MsxaNf+zZFRsXEi9yESYT+QtcemIf5t

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8086a8c7ff96f20c01b589efa6b243c.exe
    "C:\Users\Admin\AppData\Local\Temp\c8086a8c7ff96f20c01b589efa6b243c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    PID:3608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3608-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/3608-1-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/3608-3-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB