Analysis

  • max time kernel
    166s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 13:40

General

  • Target

    72f5b8c4fdffe0a24189c0bfeee319e4.exe

  • Size

    286KB

  • MD5

    72f5b8c4fdffe0a24189c0bfeee319e4

  • SHA1

    2e95c7fc587ab89c2b4b2519bc827382281e1ac0

  • SHA256

    16548e87ec747825b8c5ab20c41f5117ed65a5348f0d5ce5bb79e496b290b689

  • SHA512

    58e44b33f6206cb4a483e4896c65ee2598b3060fed45aa9f03684046b7b240c06fee6f4617e92a946c1af814ed94ff4b23a4d92b653643266ecbb1a47c70e1cf

  • SSDEEP

    6144:/DK8sPJUjzXy4+FPNiTbpT24LEyAe3seL0cpX:LK8MJc7PysJ+Re3ucpX

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72f5b8c4fdffe0a24189c0bfeee319e4.exe
    "C:\Users\Admin\AppData\Local\Temp\72f5b8c4fdffe0a24189c0bfeee319e4.exe"
    1⤵
    • Drops file in Windows directory
    PID:180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/180-0-0x0000000000F20000-0x0000000001020000-memory.dmp

    Filesize

    1024KB

  • memory/180-2-0x0000000000E50000-0x0000000000E7F000-memory.dmp

    Filesize

    188KB

  • memory/180-15-0x0000000000F20000-0x0000000001020000-memory.dmp

    Filesize

    1024KB