Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2023, 16:48

General

  • Target

    36800ae415f5df13f28fa73261026862_JC.exe

  • Size

    34KB

  • MD5

    36800ae415f5df13f28fa73261026862

  • SHA1

    a5c80e6b36eaefd14449878d80024392afc9dfe9

  • SHA256

    d61d346fca9a0db4ce139b564acbb4af830d272fc9b30d5abcf15a6b1df845c0

  • SHA512

    e6b51b4210b1cb74a37a66616666e8a323a71802ad0e10d2bd00d4e2c5c47ea536607e74a376b196987070a47ce548f1354e9eae1eae98bb01997255ee9e9251

  • SSDEEP

    384:GBt7Br5xjLPAgA71FbhvUVuRuUBpoYrRRcg:W7BlprpARFbh6o5r/cg

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36800ae415f5df13f28fa73261026862_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\36800ae415f5df13f28fa73261026862_JC.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4532

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1141987721-3945596982-3297311814-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    396f7517401f2875fd1d1c71660557ec

    SHA1

    39e25c1c124ad06a880431fa14d844ad0bf21a07

    SHA256

    243c90cbf23c68a1d6ed76dfc9fae17928d3ca90cf35e42c35d911ac3996f80c

    SHA512

    ca867f8f2942f5802f773e159de026c04e6904c99e395b8cbcace3355f4d5e07f4ebae199247f37b8ce1815a8deccd96eecb5178e8296b4d8b69a1e6645f6ae5

  • C:\odt\config.xml.tmp

    Filesize

    35KB

    MD5

    aef337f32ade148347bf24c6342581f6

    SHA1

    f5a61b7244de6aa15b4799e6c71b932c581350fe

    SHA256

    da547ee6545b7b06186c18928e5ce06160288e7217faf706945c20427eca96d2

    SHA512

    e36ab89a0bc51caae5299254208a413a0d9f73b9fd4a9e7e9a7262e4686a2cec218ce763c93828981528a6d000bc22e891af740283d2556bcc1af27bae2c94dd