Analysis

  • max time kernel
    282s
  • max time network
    415s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 16:36

General

  • Target

    164b64aae502085878d7a6a8bdc0486fd41d7c56d6efa9d87c6d4305cfca12ba.exe

  • Size

    192KB

  • MD5

    331db229180b124863a68cd2373fea62

  • SHA1

    b9d448b55bf0d260c572a821a278ff4d4ad0423e

  • SHA256

    164b64aae502085878d7a6a8bdc0486fd41d7c56d6efa9d87c6d4305cfca12ba

  • SHA512

    c172f410c7dc97cf4e9739d5457358ce28452f99031398d129c5f121cdf71f338dd5ff2008501064200584ed30d4b73ea40c2fe57fa7f7530bb2a116ac566afd

  • SSDEEP

    3072:fw2umTbKnEcVGNisuHwYOJuHuEVNSwHsBmEvRmxs1KITDYV:fLTb0hCW3OEHFIMsD5DKQUV

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\164b64aae502085878d7a6a8bdc0486fd41d7c56d6efa9d87c6d4305cfca12ba.exe
    "C:\Users\Admin\AppData\Local\Temp\164b64aae502085878d7a6a8bdc0486fd41d7c56d6efa9d87c6d4305cfca12ba.exe"
    1⤵
    • Drops file in Windows directory
    PID:312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/312-132-0x0000000000C30000-0x0000000000C5F000-memory.dmp
    Filesize

    188KB