Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 11:04

General

  • Target

    d5f39b054b2c8a6a934da29216a022cd.exe

  • Size

    26KB

  • MD5

    d5f39b054b2c8a6a934da29216a022cd

  • SHA1

    388eb7449f62954c0960789fc0720477375a5e70

  • SHA256

    0ccfe06ac990fdbe3f7b9d287ccf56a3be8bc11dc6c86360a4e871ab613ea098

  • SHA512

    21acee5853e00f56374845f3bf30c0bb041cfe681f0aca53f1302e5bfd7e61582d2c0575556bd54e21032043aa00f9c42db9869c9ef6da4bd793ee7ebfd6c460

  • SSDEEP

    384:aaOWnXTqMGDdFSUUUJ9x2GmddLSvq6redjaoa3GZXeGhVKjSDNgn76l7c3WW+W8:r3XTEDyY8ddeyMe5a3IeOMtn76l7iWH

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5f39b054b2c8a6a934da29216a022cd.exe
    "C:\Users\Admin\AppData\Local\Temp\d5f39b054b2c8a6a934da29216a022cd.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ufr_files\NO_PWDS_report_19-03-2024_11-04-35-AIIB.bin

    Filesize

    1KB

    MD5

    979a975996f2a3b5b948b25569bf9a98

    SHA1

    33183c9eb213f5c1a0cd7912f1be58a1b04540e4

    SHA256

    42a67e0a0fdc8db533c18ce0931cba5b69a28b62d307e9d956204cb7f1484ba5

    SHA512

    58042220da75a48d63a2dcc19e45ba1ef0ae2dd58ff95d56bc669615963829e62c5b8720d5bc09a4c7815bd9c16a0749b220b3f00c2e0f50a045434dfd71dacb

  • memory/2940-0-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2940-5-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2940-12-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB