Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 22:31

General

  • Target

    15e34b36c3e12b584f794e10799984cb.exe

  • Size

    309KB

  • MD5

    15e34b36c3e12b584f794e10799984cb

  • SHA1

    ccf34683c5d22030e8f948d0aaa1128f8280daa5

  • SHA256

    051557f6cdd541fb95a660cde1c687229117e71a9c9646e3244433470a1a98da

  • SHA512

    7c8b67bd5b024fd36a667a2322051d333a7fa7ca0deced377790cc8edc94634d9d76102ec541626416c23f0a84133a891659e9117a588152bd3eda2dc01b316b

  • SSDEEP

    6144:sQ9b2HzV64XZBaGS6gU90itB4gqzJwBP8V3pt/pPJKs5Mo1:sQIjXVgE0I4gHSZNpQUMq

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15e34b36c3e12b584f794e10799984cb.exe
    "C:\Users\Admin\AppData\Local\Temp\15e34b36c3e12b584f794e10799984cb.exe"
    1⤵
    • Drops file in Windows directory
    PID:4480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4480-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/4480-2-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/4480-3-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/4480-1-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/4480-4-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4480-5-0x0000000000510000-0x000000000053F000-memory.dmp

    Filesize

    188KB

  • memory/4480-9-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4480-17-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB