Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 05:37

General

  • Target

    7e7477e23f6e9c4a6b2e3639a9388905c2a4c51cb624af06b3cc05cbe382f1bc.exe

  • Size

    223KB

  • MD5

    298b2e630b0e8aa9c0a07b585cfc8fd3

  • SHA1

    0f22c3b588911563354e0bed2b849ec7cf83cbcf

  • SHA256

    7e7477e23f6e9c4a6b2e3639a9388905c2a4c51cb624af06b3cc05cbe382f1bc

  • SHA512

    932a4ee0f203c311f8558fe96bdae662d8b36b86592a8341de59ed843d7fcde856546565e5621a2232d94c50dccb1ddd0e39ea3daa677a6792b1f63ff7ee2cbf

  • SSDEEP

    3072:V39SZ88zAcr/kvN9QgfzA3OH4+xhS2nY5QYvOWvCsX2qKuO8XScqd6QomWSiH4Fq:Hh8zxUVf83OYs2QdsIFNRiSY4X17UR

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e7477e23f6e9c4a6b2e3639a9388905c2a4c51cb624af06b3cc05cbe382f1bc.exe
    "C:\Users\Admin\AppData\Local\Temp\7e7477e23f6e9c4a6b2e3639a9388905c2a4c51cb624af06b3cc05cbe382f1bc.exe"
    1⤵
    • Drops file in Windows directory
    PID:4660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4660-132-0x00000000015D0000-0x00000000015FF000-memory.dmp

    Filesize

    188KB