Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/08/2024, 11:04

General

  • Target

    Axiom Free Temp.exe

  • Size

    168KB

  • MD5

    461a1663734d622fc49e4a03b17d284d

  • SHA1

    52505039993d7c19cc28debbaef474f5ab61c745

  • SHA256

    f55ff667003f1cb9794a487a925a6c86e9043fda46ec2ab30f8926fd5f509f59

  • SHA512

    b3c95a238ba90e72658cf2d0844f8d00dff13715110090d41031a15d0c35b082e857f5fdbc7c30deeda1164764f68bfa02fa4b89d522406c4b11b9dccca8b94d

  • SSDEEP

    3072:Lhnks0n7phfmxymej1ic0UmJTQSaMm5/6aoP1D:1tU/mxyhjGvWljoP1D

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Axiom Free Temp.exe
    "C:\Users\Admin\AppData\Local\Temp\Axiom Free Temp.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c color 5
      2⤵
        PID:4000
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        2⤵
          PID:3560
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls
          2⤵
            PID:3168
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            2⤵
              PID:3188

          Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads