Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2024 19:48

General

  • Target

    cc467849415bcbebd296d182efbb5b95.exe

  • Size

    34KB

  • MD5

    cc467849415bcbebd296d182efbb5b95

  • SHA1

    820a8daa6c7e3a7ad4af6dd403dafc6e4b649071

  • SHA256

    63261913acef40c1720fc982cd9fc11ec61e0974f4e221170b2aa9fe22b632ed

  • SHA512

    0302be0c4d4e11d5a50d41c3eb7797b5ebf7ff168d4cfd09ae4d04cba27b610fc4c90f63a87feba35a7dba2a424bad506663a508274f8b3f992be3370a0dac0f

  • SSDEEP

    768:ZYjejZ/wZxe/WA1dzJPXd5iOfS1vvzc6f62xYha58Jx:k0pgxeV3VoBLc6f6R7x

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1412
      • C:\Users\Admin\AppData\Local\Temp\cc467849415bcbebd296d182efbb5b95.exe
        "C:\Users\Admin\AppData\Local\Temp\cc467849415bcbebd296d182efbb5b95.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2240

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1412-2-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1412-5-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/2240-0-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2240-1-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2240-14-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2240-15-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB