Analysis

  • max time kernel
    95s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 15:35

General

  • Target

    $TEMP/DVDTool.exe

  • Size

    99KB

  • MD5

    8dd598db59289736c42cf73afb27787c

  • SHA1

    ec04d56c176c14b4d1201eea48805cea7f0764d4

  • SHA256

    9abcdc8ad5d114723ac0c1816520c335955cb04d1fc36b03baa8f3784b3b4a41

  • SHA512

    3b380fc858105df6d33b4c0fc4261b12aee7124fe15e3204db1f8ee56a5c6ce2dde38b485a02028da785cc101ed0c7ec1bcdd69485500cfeb4d24e465ac1b61f

  • SSDEEP

    3072:ee55xzUF4oNzCogqxdwiacjy9nF5YKiUXRq7:r7xUFbWiyZ/h

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\DVDTool.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\DVDTool.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:3452
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 1324
      2⤵
      • Program crash
      PID:3472
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3452 -ip 3452
    1⤵
      PID:1792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3452-0-0x0000000002170000-0x000000000218D000-memory.dmp

      Filesize

      116KB

    • memory/3452-1-0x0000000002170000-0x000000000218D000-memory.dmp

      Filesize

      116KB

    • memory/3452-2-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/3452-5-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/3452-6-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB