Analysis

  • max time kernel
    128s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2023 01:49

General

  • Target

    285f0853a35c0f7d019502c0bc4185e4876845c507d23d256a08526fe190a98d.exe

  • Size

    972KB

  • MD5

    2a32a3ff0f5ccad36c141efd346ba6f8

  • SHA1

    9a50507d9d95173915107471aa69c0a2f4863f79

  • SHA256

    285f0853a35c0f7d019502c0bc4185e4876845c507d23d256a08526fe190a98d

  • SHA512

    336fff5f03504ad8ce4af7b745212165cee40a7af448b9a2cc433db247bd0ac375b32b3e1300aafe716c84499d92d96ae4c24eb379c948a4e76aeeacb5d71f62

  • SSDEEP

    24576:bOoWVMkZd1+6xGEeW+661/Pgch+62eDzoqou+xicXc:c8iexu+

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\285f0853a35c0f7d019502c0bc4185e4876845c507d23d256a08526fe190a98d.exe
    "C:\Users\Admin\AppData\Local\Temp\285f0853a35c0f7d019502c0bc4185e4876845c507d23d256a08526fe190a98d.exe"
    1⤵
    • Drops file in System32 directory
    PID:4320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4320-0-0x0000000000400000-0x0000000000514000-memory.dmp

    Filesize

    1.1MB

  • memory/4320-3-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/4320-4-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/4320-5-0x0000000000400000-0x0000000000514000-memory.dmp

    Filesize

    1.1MB