Analysis

  • max time kernel
    180s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 20:52

General

  • Target

    03b2084f546b93ba7706e926c8b0bd15.exe

  • Size

    1.0MB

  • MD5

    03b2084f546b93ba7706e926c8b0bd15

  • SHA1

    fdc6985ef19220f8928f38aaf5a55d978d878f1b

  • SHA256

    5b752dc1ba6d1e430c7678b6106d6eff054dd4b917d58df8a2b1104f64ba1025

  • SHA512

    e503a0ef805c35c796157108c42bad6425adfb3897c3d4dcabe54231b7610e9e05717a17a320be8e90598dfaa6f0405f316907bc199b98113e463e001697f72f

  • SSDEEP

    24576:nncc+4S0L1P7T0Pw7F6Aj5hGRkko7xJ3az0BDHxppjy:nncc+4S0L1P7gPGGRkko7xJ3aoBxp5y

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03b2084f546b93ba7706e926c8b0bd15.exe
    "C:\Users\Admin\AppData\Local\Temp\03b2084f546b93ba7706e926c8b0bd15.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: RenamesItself
    PID:4048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\03b2084f546b93ba7706e926c8b0bd15.exe

          Filesize

          1.0MB

          MD5

          b6b68a62cd11659acc4a83949e54733f

          SHA1

          bd772a3ff1bd396029e4361eefe450a5c25c3040

          SHA256

          c068d24b77244c392dcbdc8dad0d594d320887371f4b22ae3318348df1b620ca

          SHA512

          630d26f2545f69415f219603f66583ce694d3716ed5b9f503180de47ce01669224696b154f940de70da64bee2d726b4b7166df275fcb3468948946e9c60f1c28

        • memory/4048-13-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-15-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-5-0x00000000024C0000-0x00000000024C1000-memory.dmp

          Filesize

          4KB

        • memory/4048-6-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-3-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-11-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-4-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-12-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-14-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-0-0x00000000024C0000-0x00000000024C1000-memory.dmp

          Filesize

          4KB

        • memory/4048-16-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-17-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-18-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-19-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-20-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB

        • memory/4048-21-0x0000000000400000-0x000000000050A000-memory.dmp

          Filesize

          1.0MB