Resubmissions

24-12-2024 19:02

241224-xp5fastrdy 10

16-07-2024 19:00

240716-xn2b9avhmm 10

29-04-2024 18:50

240429-xhbjmsac4x 10

29-04-2024 18:47

240429-xffetahh23 10

Analysis

  • max time kernel
    135s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 19:00

General

  • Target

    BRUH WTF/SeroXen.exe

  • Size

    334KB

  • MD5

    e9a1163f07012ba9cf0eeaa4f4274cb0

  • SHA1

    e67f4264c87ddee54d19f84b2b27d97c65960f90

  • SHA256

    dfa59e4d9561680fcaa24cd8960f3bb2e0ffd26100c1209f51c1be0f2a500508

  • SHA512

    f65b344b3ba17aa64d43a281e8e28cceb4a571d60dee3fadb1be045e319805da4ab301a809770c5e52223b371306be87c6ad75964eeed2948b23043fc14c3310

  • SSDEEP

    6144:tRdrZJksWBrhNNtEo7Mz47xwBjYjBLUec8+So53cn/BA+hbbIv:tRDLQ7gs7xijYjJelzcn/Th4

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\BRUH WTF\SeroXen.exe
    "C:\Users\Admin\AppData\Local\Temp\BRUH WTF\SeroXen.exe"
    1⤵
      PID:5096

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5096-0-0x00007FF801233000-0x00007FF801235000-memory.dmp

      Filesize

      8KB

    • memory/5096-1-0x000001BDFE150000-0x000001BDFE1A8000-memory.dmp

      Filesize

      352KB

    • memory/5096-2-0x000001BD98780000-0x000001BD987BC000-memory.dmp

      Filesize

      240KB

    • memory/5096-3-0x000001BD98830000-0x000001BD9886E000-memory.dmp

      Filesize

      248KB

    • memory/5096-4-0x00007FF801230000-0x00007FF801CF1000-memory.dmp

      Filesize

      10.8MB

    • memory/5096-5-0x00007FF801230000-0x00007FF801CF1000-memory.dmp

      Filesize

      10.8MB

    • memory/5096-6-0x00007FF801230000-0x00007FF801CF1000-memory.dmp

      Filesize

      10.8MB