Analysis

  • max time kernel
    170s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 12:37

General

  • Target

    5312fd0c1408cc609f0710160814c3b89d9d4069ba37a4731ea103b3724c4391.exe

  • Size

    2.0MB

  • MD5

    61c53e1c3c1f8be0400ab443f09b9f5e

  • SHA1

    48753bb38f1029ca288857d7326abf55ab863eef

  • SHA256

    5312fd0c1408cc609f0710160814c3b89d9d4069ba37a4731ea103b3724c4391

  • SHA512

    b6f2393ff9515b6c81c0a4ac5f1b3e1bcde100810a56978398ede32b377aa53187f592221cd727e385544c457400431d9439092bae3faa1dda0a687f836a9e59

  • SSDEEP

    6144:sbRBIBx4aYMYGn2AtYE0EcBluBUxEbB07quK25cy5WnABuAULt9:eBI8/Gn2AwEklm5bB/uVckW+MLt9

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5312fd0c1408cc609f0710160814c3b89d9d4069ba37a4731ea103b3724c4391.exe
    "C:\Users\Admin\AppData\Local\Temp\5312fd0c1408cc609f0710160814c3b89d9d4069ba37a4731ea103b3724c4391.exe"
    1⤵
    • Drops file in Windows directory
    PID:532

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/532-132-0x00000000042F0000-0x000000000431F000-memory.dmp

    Filesize

    188KB