Analysis

  • max time kernel
    26s
  • max time network
    4s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2022 20:46

General

  • Target

    5800ccf0815fe7372c43ea0364d12adefb2ccd39c8a9690c700fedd420041588.exe

  • Size

    305KB

  • MD5

    0a57bca717ce3ed3ef45d3b931f1d289

  • SHA1

    6666c6b4b8458978803a28b46be340aba7c2171a

  • SHA256

    5800ccf0815fe7372c43ea0364d12adefb2ccd39c8a9690c700fedd420041588

  • SHA512

    aa424230bc202ae282e2ac8091970f55a7d8ba6d47e8c2cd71cd9d7084cb1997b5d471ad7403e3575396251df8855b54ac339511df463e94ed134daf0dada8ae

  • SSDEEP

    6144:aelgrMVenUAJhdwjb9rx4hM/ZkbH8ml3U6vYe7diFVtm:eMQd2b9N4hM/2bHnmRehiFfm

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5800ccf0815fe7372c43ea0364d12adefb2ccd39c8a9690c700fedd420041588.exe
    "C:\Users\Admin\AppData\Local\Temp\5800ccf0815fe7372c43ea0364d12adefb2ccd39c8a9690c700fedd420041588.exe"
    1⤵
    • Drops file in Windows directory
    PID:3440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3440-132-0x0000000003E00000-0x0000000003E2F000-memory.dmp

    Filesize

    188KB

  • memory/3440-136-0x0000000000840000-0x0000000000873000-memory.dmp

    Filesize

    204KB