Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 23:01

General

  • Target

    41e1d29bc8d738174ea092a07d907969.exe

  • Size

    221KB

  • MD5

    41e1d29bc8d738174ea092a07d907969

  • SHA1

    448de81b018f25b41eb2b5520dfdd3be32f94628

  • SHA256

    22aed00f45ab758f4d3640c78f2c68731e91df78166f67d2d502a3701929cf73

  • SHA512

    0f56d73ec875c39435288b33f86b9cc8c1d159dc21ce8db3f9808f0f066193c4750a9b1cdb68c78fee8028a0fe67461ba0bb4ce6cd2f17ec22b73137d1430193

  • SSDEEP

    3072:A8rzHlqFbvbzOpY9XEaWcLr38XtyB/Kd5dUzLrhNaMiJY9TV+Qsvq:A8rzFqRXOeLHrmy4drCrmM2gwQsi

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41e1d29bc8d738174ea092a07d907969.exe
    "C:\Users\Admin\AppData\Local\Temp\41e1d29bc8d738174ea092a07d907969.exe"
    1⤵
    • Drops file in Windows directory
    PID:3232

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3232-1-0x0000000000780000-0x0000000000781000-memory.dmp

    Filesize

    4KB

  • memory/3232-2-0x0000000000790000-0x0000000000791000-memory.dmp

    Filesize

    4KB

  • memory/3232-0-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/3232-3-0x00000000007A0000-0x00000000007A1000-memory.dmp

    Filesize

    4KB

  • memory/3232-9-0x00000000007B0000-0x00000000007D0000-memory.dmp

    Filesize

    128KB

  • memory/3232-5-0x0000000000EE0000-0x0000000000F0F000-memory.dmp

    Filesize

    188KB

  • memory/3232-4-0x00000000007B0000-0x00000000007D0000-memory.dmp

    Filesize

    128KB

  • memory/3232-17-0x00000000007B0000-0x00000000007D0000-memory.dmp

    Filesize

    128KB