Analysis

  • max time kernel
    133s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 12:58

General

  • Target

    ab18e8b4d1c24bcafc7ad8841190fd1125396db25f33606730fe8d4c3f8ac2ad.exe

  • Size

    284KB

  • MD5

    537f05f02d81392791aff08e54585609

  • SHA1

    84caa5d9b10915c7bf11d2ad4f2d08619d70ff41

  • SHA256

    ab18e8b4d1c24bcafc7ad8841190fd1125396db25f33606730fe8d4c3f8ac2ad

  • SHA512

    19ab8104583eb62ec9b22b6351a0a7a4aff9133b2cb9b523d7124e4bce5cd261a014817babbd464f71ffe3bc07420e6581cfbc16ab1f445837c7d39e7747800a

  • SSDEEP

    6144:9FUfaKHiTxONaxDRVzeYwE5auYUvjn0vQ8:QSKHiyaxDjze5DuYguQ8

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab18e8b4d1c24bcafc7ad8841190fd1125396db25f33606730fe8d4c3f8ac2ad.exe
    "C:\Users\Admin\AppData\Local\Temp\ab18e8b4d1c24bcafc7ad8841190fd1125396db25f33606730fe8d4c3f8ac2ad.exe"
    1⤵
    • Drops file in Windows directory
    PID:4588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4588-132-0x0000000003E10000-0x0000000003E3F000-memory.dmp

    Filesize

    188KB