Analysis

  • max time kernel
    115s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2022, 00:37

General

  • Target

    44afa7ef940aa0c62fa0142dd19c0803fc494b6be3a0b9f741283a798423850e.exe

  • Size

    296KB

  • MD5

    82e18909eb52bec9cf7d6aff12f167ed

  • SHA1

    96bb07b669284e08dba3301513393441352d5e54

  • SHA256

    44afa7ef940aa0c62fa0142dd19c0803fc494b6be3a0b9f741283a798423850e

  • SHA512

    e8918dd88f33e393bb7e1b237e55bd04482392c8a2633937960278a292c708e8dee234eabbbcf6d3292622a46d544102220cb1b3fff7afdb864d45bb5bb7b393

  • SSDEEP

    6144:QrtZ0rfYXlYn7ZAK/RZaqKg0tBGA3dG2PHnNIhvUm:2tZ0TxWK/X4tFlPHnNBm

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44afa7ef940aa0c62fa0142dd19c0803fc494b6be3a0b9f741283a798423850e.exe
    "C:\Users\Admin\AppData\Local\Temp\44afa7ef940aa0c62fa0142dd19c0803fc494b6be3a0b9f741283a798423850e.exe"
    1⤵
    • Drops file in Windows directory
    PID:3992

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3992-132-0x0000000003DE0000-0x0000000003E0F000-memory.dmp

          Filesize

          188KB

        • memory/3992-136-0x0000000001130000-0x0000000001162000-memory.dmp

          Filesize

          200KB

        • memory/3992-137-0x0000000001130000-0x0000000001162000-memory.dmp

          Filesize

          200KB