Analysis

  • max time kernel
    126s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 18:39

General

  • Target

    0c87d7d5090a1830cc0f296ec75e69ec.exe

  • Size

    226KB

  • MD5

    0c87d7d5090a1830cc0f296ec75e69ec

  • SHA1

    e298b10ed2b577b69bcdc83a1bf17d0fe0cbad81

  • SHA256

    24c9bc6c612eb4a948ea46b657880a1234cc994c1bae515b5e7b0e5e7c35299a

  • SHA512

    938f9ca5deb9a3ca7244f3130fb1b5b71f5bf7386667c9c7ea12ce36d13dedf2214f4a5a0de87585d51f6aa0fb6e09709f6fc7c2c94b3ec191adb911e5e402a1

  • SSDEEP

    6144:oDv+mTvFWS9ztEnn2j9UYakSXkWTweP7gE6b0Z:oTWGw2j9oXFK0Z

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c87d7d5090a1830cc0f296ec75e69ec.exe
    "C:\Users\Admin\AppData\Local\Temp\0c87d7d5090a1830cc0f296ec75e69ec.exe"
    1⤵
    • Drops file in Windows directory
    PID:3056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3056-1-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/3056-0-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/3056-2-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/3056-3-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/3056-4-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/3056-5-0x00000000009E0000-0x0000000000A00000-memory.dmp

    Filesize

    128KB

  • memory/3056-6-0x0000000000B10000-0x0000000000B3F000-memory.dmp

    Filesize

    188KB

  • memory/3056-10-0x00000000009E0000-0x0000000000A00000-memory.dmp

    Filesize

    128KB

  • memory/3056-18-0x00000000009E0000-0x0000000000A00000-memory.dmp

    Filesize

    128KB