Resubmissions

21-05-2024 15:45

240521-s6292sah6y 9

Analysis

  • max time kernel
    430s
  • max time network
    436s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 15:45

General

  • Target

    dumpcap.exe

  • Size

    513KB

  • MD5

    025814d22e9f5c211d5a3f152a6116f1

  • SHA1

    e7e18ddc368d3cf4dea5ff0136b71664df6c8feb

  • SHA256

    423601a52a1ec782168b9d114fad1969eef2ed8bc67b2777549d001c9e2911f4

  • SHA512

    dc5884c3bf2179fa9370c3d85e212ffb192921952f57774ec312bbdbf53d76ec55ccb064a7899ad847ca0bbfa79c9d5a91e089ad4a3a69bd96ee05f680b06b5f

  • SSDEEP

    6144:JyKv/o2mmSw+6R7n5C+ibky8PPEMceJAIqHn3AuSFP9P9gh:tv/o2mm2i75BiYy2PExemIqXAjFP9Puh

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dumpcap.exe
    "C:\Users\Admin\AppData\Local\Temp\dumpcap.exe"
    1⤵
    • Checks processor information in registry
    PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads