Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 20:50

General

  • Target

    15da8c45e039d53cea40c3e6b9e09df6909b2159649c300ea72eb50eb171a342.exe

  • Size

    346KB

  • MD5

    6eb19d52dec077efbdb7b7dae45d5219

  • SHA1

    6742aa1341e3d066bbcc1cd0161307d753f7c096

  • SHA256

    15da8c45e039d53cea40c3e6b9e09df6909b2159649c300ea72eb50eb171a342

  • SHA512

    b2ab4ba4507534f945c513f4b2b668bf667ca27baba61608c1e03a4fd687c15958d66a3e5004cbf0648c9fbf2fce78005081b5d6dc1f71615ea99e733197b59b

  • SSDEEP

    6144:HzzuMGSUfp/66FWMSyxuo9adXWcDilv0N9p2zHQZ8:HzCDSUh/6Jyso9JcOzwZ8

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15da8c45e039d53cea40c3e6b9e09df6909b2159649c300ea72eb50eb171a342.exe
    "C:\Users\Admin\AppData\Local\Temp\15da8c45e039d53cea40c3e6b9e09df6909b2159649c300ea72eb50eb171a342.exe"
    1⤵
    • Drops file in Windows directory
    PID:1044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1044-132-0x00000000009A0000-0x00000000009CF000-memory.dmp

    Filesize

    188KB