Analysis

  • max time kernel
    142s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 20:44

General

  • Target

    03849c15579905128807e0862926d6e0.exe

  • Size

    36KB

  • MD5

    03849c15579905128807e0862926d6e0

  • SHA1

    0fa102b6a29083e45994f220f97ebce718cb4292

  • SHA256

    f88e6650922788132cfa112e6294b6363c4085a860c3d0471a05389558ee53dd

  • SHA512

    45126ece19b97931761e9ad43e595247fd7bf34bfc203005a7fd905d7948230ea274e5f5dd88339af4195db17af30bcaf978e9d1e23f0c1198ea400863eaf6bc

  • SSDEEP

    384:U59v1qoQuDFL4bUNjQ38QdrrhORZZ+bf7MQuWeZ01pL4aKeU52G3m:0qo35rQ38Qdrrh0ZZx921pca

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03849c15579905128807e0862926d6e0.exe
    "C:\Users\Admin\AppData\Local\Temp\03849c15579905128807e0862926d6e0.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: RenamesItself
    PID:4872

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads