Analysis

  • max time kernel
    146s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 02:44

General

  • Target

    4d9151f4003a591ffc2efa6ec7b77004.exe

  • Size

    225KB

  • MD5

    4d9151f4003a591ffc2efa6ec7b77004

  • SHA1

    471fa273cadb90d0d754b593d0619ecc76f3092b

  • SHA256

    16a19ac08045d5252739fc31ad0bd071f1b2f5e5a8db45cf36803ec2a0545797

  • SHA512

    38573f7dc69062d6e39af5cecb8216d3b30cea50119fef632fcae9569a218a3084fe6aa51d2d7ebc71ebf51b0224a8d453107df36baaffd8c8f655e94f2974b4

  • SSDEEP

    3072:4SOfDH1eqz1gYOSYQ8zSMbq7j3LkeHrFnvQKKnvxOY7c/oYWWkP2Z:8ZZO11+33AqFIKKZOSc/oVWkP6

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d9151f4003a591ffc2efa6ec7b77004.exe
    "C:\Users\Admin\AppData\Local\Temp\4d9151f4003a591ffc2efa6ec7b77004.exe"
    1⤵
    • Drops file in Windows directory
    PID:4560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4560-1-0x0000000000FD0000-0x0000000000FD1000-memory.dmp

    Filesize

    4KB

  • memory/4560-0-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

    Filesize

    4KB

  • memory/4560-2-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

    Filesize

    4KB

  • memory/4560-3-0x0000000000FE0000-0x0000000000FE1000-memory.dmp

    Filesize

    4KB

  • memory/4560-4-0x0000000001810000-0x0000000001811000-memory.dmp

    Filesize

    4KB

  • memory/4560-5-0x0000000001820000-0x0000000001840000-memory.dmp

    Filesize

    128KB

  • memory/4560-6-0x0000000002100000-0x000000000212F000-memory.dmp

    Filesize

    188KB

  • memory/4560-10-0x0000000001820000-0x0000000001840000-memory.dmp

    Filesize

    128KB

  • memory/4560-18-0x0000000001820000-0x0000000001840000-memory.dmp

    Filesize

    128KB