Analysis

  • max time kernel
    199s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:12

General

  • Target

    20db8091c6175658f9d001561f3081af.exe

  • Size

    103KB

  • MD5

    20db8091c6175658f9d001561f3081af

  • SHA1

    a4d09f6e3ed10e218fa38f697c69f1cd0ce025bc

  • SHA256

    27e57a6a50aa8a2e2ff74e826495a073eb815588aaa2c485163f05dec481c40e

  • SHA512

    2552ede8eaf82447cc7a25f17eb8525607769129fc74a2fbe769d0d4db544c128f92b529eb85c568677c209a01604e8497a85b52902bb1139eeaa76470cbc8e3

  • SSDEEP

    1536:wFwxVMhuxCuOsmThucSiCnx2paDybq91+7SnoYOqGXbshWInuQixAr+L3HL:WwxVMhOC/dTDbq91+mno3t4QZQ3rAHL

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20db8091c6175658f9d001561f3081af.exe
    "C:\Users\Admin\AppData\Local\Temp\20db8091c6175658f9d001561f3081af.exe"
    1⤵
    • Drops desktop.ini file(s)
    PID:2524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2524-4-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB