Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 08:42

General

  • Target

    60a49603ec20c06297467996d37277f6.exe

  • Size

    224KB

  • MD5

    60a49603ec20c06297467996d37277f6

  • SHA1

    74c39e0e95fcc336d65080a1a685dfb464919aa8

  • SHA256

    21c6a91092104393d8fbea86eb243a43dd8affc616e956b87bfb6c9dab52d96b

  • SHA512

    5841cbc46909119e593a18a953f490b7ae01e026434113a7eaccc19cdde99a1269cafb9d5b72d4062f41d4ccb0d84dc4c3b0e8a7494e49fc3ad401a98b047e93

  • SSDEEP

    3072:CcFXb1bW8HfeSnNXlaHjR+oSvyDbf57bwyiO26w+cHHerrHtYI11y1yB/hhkXh7M:jbWWe+oS6D17bel6w+cHHCyS0Xh7M

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60a49603ec20c06297467996d37277f6.exe
    "C:\Users\Admin\AppData\Local\Temp\60a49603ec20c06297467996d37277f6.exe"
    1⤵
    • Drops file in Windows directory
    PID:3132

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3132-2-0x0000000001270000-0x0000000001280000-memory.dmp

          Filesize

          64KB

        • memory/3132-1-0x0000000000DF0000-0x0000000000E00000-memory.dmp

          Filesize

          64KB

        • memory/3132-3-0x0000000000D70000-0x0000000000D90000-memory.dmp

          Filesize

          128KB

        • memory/3132-8-0x0000000000D70000-0x0000000000D90000-memory.dmp

          Filesize

          128KB

        • memory/3132-4-0x0000000000EF0000-0x0000000000F1F000-memory.dmp

          Filesize

          188KB

        • memory/3132-0-0x0000000001290000-0x00000000012A0000-memory.dmp

          Filesize

          64KB

        • memory/3132-16-0x0000000000D70000-0x0000000000D90000-memory.dmp

          Filesize

          128KB