Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 10:26

General

  • Target

    ddc8c6bfca5f5c829a21f8f313e23a47.exe

  • Size

    96KB

  • MD5

    ddc8c6bfca5f5c829a21f8f313e23a47

  • SHA1

    7d18f0fccd1377c5c524a1967e2a854e99b8a5ec

  • SHA256

    ba7f1a5beec90cbf6d7e595655de8db689c09d258306b4f8bb90653c4c622f89

  • SHA512

    c319d9df21f8d92f2b783e2beecbfd29be57f482bf66ddf9c858601a834ad12d01e74589828794181e0bc62cc037920e8f1d419f15466363dc48d5659175b424

  • SSDEEP

    1536:y1BRQnHJ51D1p7wi16a2s6vh6u3bpMg1OKQe9V+HQmcYmfzj9zgx6:yyDpEi16L33bZYzU5K6

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddc8c6bfca5f5c829a21f8f313e23a47.exe
    "C:\Users\Admin\AppData\Local\Temp\ddc8c6bfca5f5c829a21f8f313e23a47.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1996

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1996-0-0x0000000000230000-0x0000000000234000-memory.dmp
    Filesize

    16KB

  • memory/1996-1-0x0000000010000000-0x0000000010017000-memory.dmp
    Filesize

    92KB

  • memory/1996-4-0x0000000000400000-0x0000000000507000-memory.dmp
    Filesize

    1.0MB

  • memory/1996-7-0x0000000000230000-0x0000000000234000-memory.dmp
    Filesize

    16KB