Analysis

  • max time kernel
    174s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 11:47

General

  • Target

    1bdefd0114b515185c51daf4caba1604.exe

  • Size

    55KB

  • MD5

    1bdefd0114b515185c51daf4caba1604

  • SHA1

    50fa091423265c9f35c42542b50b2aa78a313669

  • SHA256

    5c8ce9fb74edfb0cae4e05db7563f38c32ad0c3bbbbed58a7914940915bde164

  • SHA512

    51114cdafbdf4918b52dc2099cbf5c9ce3bd0762bb390a24aac918b52a299bffdc88baa4ae1ec44e1abe41de3d012efea3db210a4743519cb78696cc9e4a0b18

  • SSDEEP

    1536:NQ56/eLLlTV/mGLfK+P/Rrh0anLF4vqUtrq+CbVj/kI7voN3VVNFcRbsENDYEQ24:NsDdK4VJ5q0G

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bdefd0114b515185c51daf4caba1604.exe
    "C:\Users\Admin\AppData\Local\Temp\1bdefd0114b515185c51daf4caba1604.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NO_PWDS_report_26-12-2023_03-06-47-737D71BB-INKF.bin

    Filesize

    1KB

    MD5

    2d662fed701ae7c7bf86d1a728165d1b

    SHA1

    356b5419f3180de64e8b2a8f25306620d738b7fc

    SHA256

    9ebd2dde4278893646a4e23b9218865c40f1661a881527d4d2fa53e5f03eef43

    SHA512

    4e0420b1458a5a73b2c9b6748c8210e0fa57497c0fc8c42988e9c04e5ffe02d872d5c6759759f3a8e7f376ea62b71bda417a193be9e4c09ae9f55a868af10858

  • memory/2432-0-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2432-10-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB