Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:24

General

  • Target

    218ab5ab075fca6534a368d70a6a7a34.exe

  • Size

    217KB

  • MD5

    218ab5ab075fca6534a368d70a6a7a34

  • SHA1

    e50b816b8c7f5486e70aea39e9d26c4ec63cbc78

  • SHA256

    239cf8848489b8091addc76a816fd951e078bbd1f29433680c578a912006adcc

  • SHA512

    fcdd08100f9df115fdf776d5c9b93f22bac208c9bf68f7e8fd44e4eaee274258d5d9e75e62a60c46452d1d447a63421588134aa588dbf0ade7fccdfd4222ed4b

  • SSDEEP

    3072:EJ3KXYnVEr0vurR1suQ8jraBSxrbwgePBd2H/FZ4cPhQW1BAqczA:Y3n2V7xnwgeZoH/fLKWDHc0

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\218ab5ab075fca6534a368d70a6a7a34.exe
    "C:\Users\Admin\AppData\Local\Temp\218ab5ab075fca6534a368d70a6a7a34.exe"
    1⤵
    • Drops file in Windows directory
    PID:628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/628-3-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/628-2-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

    Filesize

    4KB

  • memory/628-4-0x0000000000BF0000-0x0000000000C10000-memory.dmp

    Filesize

    128KB

  • memory/628-9-0x0000000000BF0000-0x0000000000C10000-memory.dmp

    Filesize

    128KB

  • memory/628-5-0x0000000000E40000-0x0000000000E6F000-memory.dmp

    Filesize

    188KB

  • memory/628-1-0x00000000005E0000-0x00000000005E1000-memory.dmp

    Filesize

    4KB

  • memory/628-0-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/628-17-0x0000000000BF0000-0x0000000000C10000-memory.dmp

    Filesize

    128KB