Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 10:25

General

  • Target

    170ca751352a537503c79b19b989095c.exe

  • Size

    951KB

  • MD5

    170ca751352a537503c79b19b989095c

  • SHA1

    84808c8a9f7a4e129cb01deaf5606796dc6e54e2

  • SHA256

    e7d23d80eb8526453c65d5f1a7460be254acc9fc1bde347206c3c9080468a416

  • SHA512

    6c7575db2b32e36444d0f560b46a0f3715443835ce6d4eba2b350b8fcf64125e2ddd6c10c6f8beaf44aea90c6fe7928ccf3a40163fd9875ca7431ac370881616

  • SSDEEP

    12288:bF2ViIkrx4+xXaP1tnChkK9hZtu4zDdO7phiCgYgxns6mux:J2oIi4+8tmxh/LD41/

Score
1/10

Malware Config

Signatures

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\170ca751352a537503c79b19b989095c.exe
    "C:\Users\Admin\AppData\Local\Temp\170ca751352a537503c79b19b989095c.exe"
    1⤵
    • Modifies registry class
    PID:1008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1008-0-0x0000000000B00000-0x0000000000B01000-memory.dmp

    Filesize

    4KB

  • memory/1008-1-0x0000000000B00000-0x0000000000B01000-memory.dmp

    Filesize

    4KB