Analysis

  • max time kernel
    145s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 23:57

General

  • Target

    8ad00bb11b244979f4338ef143d09e6966cf8dc4a61d1c7dd371880fbdc8fe10.exe

  • Size

    253KB

  • MD5

    76eb2fe4008f7ea439e751629b602953

  • SHA1

    39a53b921681e3634a053341636c07257a8fec98

  • SHA256

    8ad00bb11b244979f4338ef143d09e6966cf8dc4a61d1c7dd371880fbdc8fe10

  • SHA512

    fc7187d5d5745d945808f71761baa3031ed46e69340ebfa7dcbd58b513d0c11447c58348307808eb9380fcf5f3c2dc329d2df946bdb1464e6ebd3f1d1646cd5b

  • SSDEEP

    6144:C8I/UxWZgBCxiZdp/69xaFu0POqtTB5s0zWo:C8aUwUhd16iu0mqtTNr

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ad00bb11b244979f4338ef143d09e6966cf8dc4a61d1c7dd371880fbdc8fe10.exe
    "C:\Users\Admin\AppData\Local\Temp\8ad00bb11b244979f4338ef143d09e6966cf8dc4a61d1c7dd371880fbdc8fe10.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:688

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads