Analysis

  • max time kernel
    135s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2022 04:09

General

  • Target

    5652b2b2b853686ff9c87362bfd17d93c521b5407d75f6b02be51e8e6eb349f1.exe

  • Size

    345KB

  • MD5

    5f7d946541213c42739761c44ec65d3f

  • SHA1

    f6554af9040673bfb8fbae1d94a20847d8136656

  • SHA256

    5652b2b2b853686ff9c87362bfd17d93c521b5407d75f6b02be51e8e6eb349f1

  • SHA512

    6cd0b389f52fd56839c4473b47a352ae7b4bec35d41fe8e083f8587895528f65e2fb829848c203c0d65d1508edbc300368bac8326e04a6a516c5914e9a2fc73b

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5652b2b2b853686ff9c87362bfd17d93c521b5407d75f6b02be51e8e6eb349f1.exe
    "C:\Users\Admin\AppData\Local\Temp\5652b2b2b853686ff9c87362bfd17d93c521b5407d75f6b02be51e8e6eb349f1.exe"
    1⤵
    • Drops file in Windows directory
    PID:4180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4180-130-0x0000000000980000-0x00000000009AF000-memory.dmp
    Filesize

    188KB