Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 23:28

General

  • Target

    43406d83103ed392b055ec4232f7b524.exe

  • Size

    2.5MB

  • MD5

    43406d83103ed392b055ec4232f7b524

  • SHA1

    3d5a3fa513c3ef915987ca806d05fa89c5dc266c

  • SHA256

    e5467c42ff8ab5d03f6a92c75addd316a773ae89b8773c7cf62d039d0adfd135

  • SHA512

    ecd800902b3ed5e71676544a1adb7c1a772acb71d32ea144203f60d81c15f5385b9ef3cb4b416ab3070dbdeba146adbc6288de62abd749ddf0d4d8040783a041

  • SSDEEP

    49152:mFFck1J9GfOwfGBpaXEWJJKLRFZ5gi6nj7zk6fIK4QaE1:Hk1CfOqSpiEcUZgzzkoIDQ71

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43406d83103ed392b055ec4232f7b524.exe
    "C:\Users\Admin\AppData\Local\Temp\43406d83103ed392b055ec4232f7b524.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\popcfg2\files.cab

    Filesize

    472KB

    MD5

    f484286203784727d965d627c3e757da

    SHA1

    df2e3058e7476bb4b540fca04d964565dbf21c99

    SHA256

    86c39e4f463e461c2a244b28df6efee5d9e131001d5cf05f97e8193e2d35b2d2

    SHA512

    f48b61941b6d5bdb0e507a7b51f17cd4a4b180d2953fdb666b90f717099d8d4b4fed40ca44379f228226b5e120a9207f25a203b55ab663ed2814110602588ccd