Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 11:55

General

  • Target

    6c71c54053f5ace796f5f26f9969d867.exe

  • Size

    430KB

  • MD5

    6c71c54053f5ace796f5f26f9969d867

  • SHA1

    b6873cd1c7fc4969fc6649333f593aba5b170aab

  • SHA256

    7b9b55d769e72aa5528b32b693c0ff3ac5f9e8d023e7cbfac7b1bf3dd2387fa4

  • SHA512

    1ae5e451052609976ba4fcd70e7462382e071d5dddf748c359aca21f3dc92ff3c575b2070a1b7ced5f3f69d169ace6c50d0094942fdb9fe91e1eb5f5291fb319

  • SSDEEP

    6144:gmPTBIWwzrxeCtPRN1dw2FRWbOCNHbNiJUvzRo1c0pgr0Y4eRd079pt29:gYpWekR3BRWCYcJ0RENCRGhTw

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c71c54053f5ace796f5f26f9969d867.exe
    "C:\Users\Admin\AppData\Local\Temp\6c71c54053f5ace796f5f26f9969d867.exe"
    1⤵
    • Drops file in Windows directory
    PID:1900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads