Analysis

  • max time kernel
    136s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 03:50

General

  • Target

    2908-31-0x0000000000830000-0x00000000014BC000-memory.exe

  • Size

    12.5MB

  • MD5

    518a553a79e4a344bb56edd522f4012a

  • SHA1

    56f9b97a0178bfb959d6cdb6a6b8e038637ecc80

  • SHA256

    cb300125e34140fd76fe109583795b233ebe97a63eae808f4b247ac6639b9e9c

  • SHA512

    cb65dbe789240c1915720562abca8a82b8a000090df144c29fb512e729bce370ac6bd22b17624d74b275f2635f628eb70bc0d02a61214954a6ba3f8963eac042

  • SSDEEP

    393216:sugfPbdP5ZWb8f4wx4Fcv+hgAF8+smNrTG2:suKPJrs8VxEcWoNmN3G

Score
10/10

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2908-31-0x0000000000830000-0x00000000014BC000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2908-31-0x0000000000830000-0x00000000014BC000-memory.exe"
    1⤵
      PID:3880

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3880-0-0x0000000000830000-0x00000000014BC000-memory.dmp
      Filesize

      12.5MB