Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2024 04:55

General

  • Target

    8fc1f04e019d6acd9ad48d7870165453c90f3ba44ed4ab75de6e9e81081747a9.exe

  • Size

    8.3MB

  • MD5

    b106871ca597439f1f17da40c9e33f30

  • SHA1

    083c1854abb597bfa00051cc0bba0c2b0b91a520

  • SHA256

    8fc1f04e019d6acd9ad48d7870165453c90f3ba44ed4ab75de6e9e81081747a9

  • SHA512

    6ea5715eb7e7595dd25793f6df309f37377ca589188570cc62a31856a9bb066fe6d1a187e0b58b99b69569ee1309a6f20e5f7582828c0891324c3e97c6242517

  • SSDEEP

    196608:Qn7hnm+JtDL+N/y+ipZjuBG67Yelju+RxtakZt17CEvi:Qn7hnm+JtH+N/yv10Gsly+3wcX7CMi

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fc1f04e019d6acd9ad48d7870165453c90f3ba44ed4ab75de6e9e81081747a9.exe
    "C:\Users\Admin\AppData\Local\Temp\8fc1f04e019d6acd9ad48d7870165453c90f3ba44ed4ab75de6e9e81081747a9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:456

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\tkc\CDROOT\PROGRAMS\WIN\00205105\Setupw.inf

    Filesize

    2KB

    MD5

    32f09733bd93bbd2b1083d9b7528b8d5

    SHA1

    88c703424e84118508d1897608d296f006045f35

    SHA256

    8fea00b5301e6a4647183f6f0c1a560c65a363a60dadfec502c2ebd268dc65f6

    SHA512

    35ddb61dc49b5b261cd87e9484032709d1f40c40b120905e1293fa2a4d3bfb9642c6f127c24e074e3f47a4f18936102824e848449d260b0c68d0508fdeba22b3

  • memory/456-0-0x0000000002DA0000-0x0000000002DA1000-memory.dmp

    Filesize

    4KB

  • memory/456-33-0x0000000000400000-0x0000000000C61000-memory.dmp

    Filesize

    8.4MB