Analysis

  • max time kernel
    2s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 05:38

General

  • Target

    102efbc6c92c232aa554e3c40820fb85.exe

  • Size

    84KB

  • MD5

    102efbc6c92c232aa554e3c40820fb85

  • SHA1

    e44fa6e1a06e2f4d2ed563ca8a7d44b67fb7321a

  • SHA256

    95f640cc8c4c93f3d45335dba5381515e0e2eb5c8848ab443f64f66aa673bfb3

  • SHA512

    812801262cc99bb8873b9feb7feb7406c90c35070fe928b3bf7bd1c0d6d18bc37acc218982e5040bcedd9b5171aebaeaf3da308e5beb086c457e8ebf8f01fc66

  • SSDEEP

    1536:larO2R3XZVPlF31n1TClFvLLcAGJn+yRJCPDzzRDyRcpJFnpz:lV2BZVPlFlnxClFvLLcA+sPDzzRD9Hnd

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\102efbc6c92c232aa554e3c40820fb85.exe
    "C:\Users\Admin\AppData\Local\Temp\102efbc6c92c232aa554e3c40820fb85.exe"
    1⤵
    • Drops file in Windows directory
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\win32dc\DAoC + codes.exe

    Filesize

    10KB

    MD5

    21963b4de54b3c145e0877b7ae725346

    SHA1

    74d7594843a231430d72a5e31df8f8849d429543

    SHA256

    178562515ad1d37b1713e93db8a34a8073167eb963c8b87274936dfdd82d213c

    SHA512

    e3deec323af617ea4d13d316ed07d948b37caba6698dff2025aa967d51cf82834d423444ec5576435d5df799402c552f073ab0aed14264bdab95dc14c65db00d

  • memory/2172-15-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB