Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 21:05

General

  • Target

    f81f2313e3bc9c1aa5224b2d19d01b68.exe

  • Size

    219KB

  • MD5

    f81f2313e3bc9c1aa5224b2d19d01b68

  • SHA1

    feb23abe6fafe5efb3ac4c4ce82b352f2d5a9196

  • SHA256

    24329da24cdfea97a5fe5fc7631eb25147c97754e4658215be0eb5cc20a7d654

  • SHA512

    87f3a23e83e7e28681d64e63eabd2c2e3adb1c56bd78fda875ea016b2d72383ad142bc1613d926ccfe8223c355982696f0a7e893ad35c2297dfa9024039de110

  • SSDEEP

    6144:pb3ZjMGYstYvdNFTBwuIaFVjDulcZXl2mngk:pt4jH9Bw6FVHulcf2mngk

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f81f2313e3bc9c1aa5224b2d19d01b68.exe
    "C:\Users\Admin\AppData\Local\Temp\f81f2313e3bc9c1aa5224b2d19d01b68.exe"
    1⤵
    • Drops file in Windows directory
    PID:2800

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2800-3-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/2800-2-0x00000000014A0000-0x00000000014A1000-memory.dmp

    Filesize

    4KB

  • memory/2800-9-0x00000000014B0000-0x00000000014D0000-memory.dmp

    Filesize

    128KB

  • memory/2800-5-0x0000000001D90000-0x0000000001DBF000-memory.dmp

    Filesize

    188KB

  • memory/2800-4-0x00000000014B0000-0x00000000014D0000-memory.dmp

    Filesize

    128KB

  • memory/2800-1-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/2800-0-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2800-17-0x00000000014B0000-0x00000000014D0000-memory.dmp

    Filesize

    128KB