Analysis

  • max time kernel
    30s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:25

General

  • Target

    13c384e6523601f47e86c85084ad7fc0c93f7ad3f91122a06053f47625c41ba8N.exe

  • Size

    20KB

  • MD5

    d3cc0de18f4d0be3a76f49e560218cc0

  • SHA1

    d47b5a5c7833c3e405b044f9c9c82f792e5b4b65

  • SHA256

    13c384e6523601f47e86c85084ad7fc0c93f7ad3f91122a06053f47625c41ba8

  • SHA512

    8a84f41a85ba115909de57779e6f873a2ec6d1e8e931e5fe54eedc7c9dcbab7d0da5324356046b84b6a4061a6d0b7570c652d0e19284eb43fe94f9f2be30be4d

  • SSDEEP

    384:qShh/3zEwDNpsLL/59THdwnN3ejwZGEd3m3Dz6:qq5Z+DnpwnJcEM3D

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13c384e6523601f47e86c85084ad7fc0c93f7ad3f91122a06053f47625c41ba8N.exe
    "C:\Users\Admin\AppData\Local\Temp\13c384e6523601f47e86c85084ad7fc0c93f7ad3f91122a06053f47625c41ba8N.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c mode con: cols=70 lines=20
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\system32\mode.com
        mode con: cols=70 lines=20
        3⤵
          PID:2788

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads