Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2024 11:04

General

  • Target

    d5f39b054b2c8a6a934da29216a022cd.exe

  • Size

    26KB

  • MD5

    d5f39b054b2c8a6a934da29216a022cd

  • SHA1

    388eb7449f62954c0960789fc0720477375a5e70

  • SHA256

    0ccfe06ac990fdbe3f7b9d287ccf56a3be8bc11dc6c86360a4e871ab613ea098

  • SHA512

    21acee5853e00f56374845f3bf30c0bb041cfe681f0aca53f1302e5bfd7e61582d2c0575556bd54e21032043aa00f9c42db9869c9ef6da4bd793ee7ebfd6c460

  • SSDEEP

    384:aaOWnXTqMGDdFSUUUJ9x2GmddLSvq6redjaoa3GZXeGhVKjSDNgn76l7c3WW+W8:r3XTEDyY8ddeyMe5a3IeOMtn76l7iWH

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5f39b054b2c8a6a934da29216a022cd.exe
    "C:\Users\Admin\AppData\Local\Temp\d5f39b054b2c8a6a934da29216a022cd.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ufr_files\NO_PWDS_report_19-03-2024_11-04-31-FCEI.bin

    Filesize

    1KB

    MD5

    382d7aac9b1bd969cfb0dd6c6a6e77e2

    SHA1

    812a48d167a0d40051617ab70025b4174ba40964

    SHA256

    97c1fc71b4d49b953a5f7bb7a03566ebe1a1dd81eeb43c6e6e402946f1eeec93

    SHA512

    9968706f7b7aa7805fc754425e327184e1011ca8930ea8f2b8c3893808d7a4f6e0fa0a90dc313c326657adff35956929a0cf9228e2762a1a5bc69fbba6fe834f

  • memory/3300-0-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3300-5-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3300-13-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB