Analysis

  • max time kernel
    123s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 13:01

General

  • Target

    b4cea161d9c037efe9a5743a51569fa048e3e43be58b29605ba72a1e2a7e94f2.exe

  • Size

    299KB

  • MD5

    6e6fcd19e67d8595f121ac8e0a5957f1

  • SHA1

    100a09c48f837f18701c56da52ad713f3a323e95

  • SHA256

    b4cea161d9c037efe9a5743a51569fa048e3e43be58b29605ba72a1e2a7e94f2

  • SHA512

    dca76ba5ae9b1fb755c301cef1890d78000b7e17933ac2fb3db3a6bb8240be9f737cb13472c578ae03a77417c24be8fe6765f6683fce260270e0d3aa539c2b8f

  • SSDEEP

    6144:awZI24IrBnYyhom8wJnroRMAVsHtj5HZ09h:awGqJoWJnreMASH3+9h

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4cea161d9c037efe9a5743a51569fa048e3e43be58b29605ba72a1e2a7e94f2.exe
    "C:\Users\Admin\AppData\Local\Temp\b4cea161d9c037efe9a5743a51569fa048e3e43be58b29605ba72a1e2a7e94f2.exe"
    1⤵
    • Drops file in Windows directory
    PID:4640

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4640-132-0x0000000000140000-0x0000000000171000-memory.dmp

          Filesize

          196KB

        • memory/4640-133-0x00000000008A0000-0x00000000008CF000-memory.dmp

          Filesize

          188KB

        • memory/4640-137-0x0000000000140000-0x0000000000171000-memory.dmp

          Filesize

          196KB

        • memory/4640-138-0x0000000000140000-0x0000000000171000-memory.dmp

          Filesize

          196KB