Analysis

  • max time kernel
    118s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 06:25

General

  • Target

    110639b18c922f5b53fac383726ca017.exe

  • Size

    298KB

  • MD5

    110639b18c922f5b53fac383726ca017

  • SHA1

    ac0396f0c7a2d8203ce1787faf43cff0b95160f1

  • SHA256

    434795133de57539ca28cddfcbd34a6d3c286de6ef0a1b734c3a0ef446ee5e02

  • SHA512

    f11d621f5819dc185f5537ef36f4a9761db4ad004ca80bd09bc2a36e5b67f6f10648cf149fe704ec2f6884a8393263ec1a7c88d2f73ddbb7d09db6832597efbb

  • SSDEEP

    6144:FFXADQv4YtO8cAsRZZGvNZpzHb438D9VROY8LEDjXW:FOc5DEspzHbmyRWEDjXW

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\110639b18c922f5b53fac383726ca017.exe
    "C:\Users\Admin\AppData\Local\Temp\110639b18c922f5b53fac383726ca017.exe"
    1⤵
    • Drops file in Windows directory
    PID:812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/812-1-0x0000000000E30000-0x0000000000E40000-memory.dmp

    Filesize

    64KB

  • memory/812-2-0x0000000001650000-0x0000000001750000-memory.dmp

    Filesize

    1024KB

  • memory/812-0-0x0000000000D30000-0x0000000000D40000-memory.dmp

    Filesize

    64KB

  • memory/812-4-0x0000000000D00000-0x0000000000D2F000-memory.dmp

    Filesize

    188KB