Analysis

  • max time kernel
    160s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 18:13

General

  • Target

    33a4a43d3ca10293661fb7875ea72536.exe

  • Size

    284KB

  • MD5

    33a4a43d3ca10293661fb7875ea72536

  • SHA1

    20a51a9d6468e103e3a42307f15853823a8d1b75

  • SHA256

    200571af7123427576404030af71825b308475a40a1f6fa86fd695117a2db0d7

  • SHA512

    eb02c2e29ddec67a6e594649cf9ebcfd121b712fda12765da56c7cd60c5f694c378c08005bf81d31677c0da5fdf81bce1ba26183ab9d678b24823af590bc264a

  • SSDEEP

    3072:atjjltGsxWhYhO8Vw+pbaCBguzVcaJN5xB6sNERi9TPezvUGFECt7tU:qZxE8q+JmuJJNXkMGFEq7C

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33a4a43d3ca10293661fb7875ea72536.exe
    "C:\Users\Admin\AppData\Local\Temp\33a4a43d3ca10293661fb7875ea72536.exe"
    1⤵
    • Drops file in Windows directory
    PID:4712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4712-0-0x00000000017F0000-0x00000000018F0000-memory.dmp

    Filesize

    1024KB

  • memory/4712-2-0x0000000004DB0000-0x0000000004DDF000-memory.dmp

    Filesize

    188KB