Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 06:49

General

  • Target

    11744430adee5687fe8bfd1ba93a69c4.exe

  • Size

    193KB

  • MD5

    11744430adee5687fe8bfd1ba93a69c4

  • SHA1

    c7d58f6b7e1628e0feb8f71487fbfed2a4189cee

  • SHA256

    184a43acac05c62da0cac7625d29cbf5fac97aa2f971011bcf01f378fbc23c79

  • SHA512

    63e0f2a3dd6872ec88de2dd0d9b534d2259a0c3f6e1855972ed76e0ff14faf1a26a5c3745c7fc30c8c6db46b6f33ff3a53dfa1b0bb34eb95da5cfce513698c0e

  • SSDEEP

    3072:YlTUlpHMyVYu5J/8SD9qFJH9QtYObIzABpm8V06Rt7suLt3Lt8s87w:8TcBVSe9qFxSMwJXt8s87w

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11744430adee5687fe8bfd1ba93a69c4.exe
    "C:\Users\Admin\AppData\Local\Temp\11744430adee5687fe8bfd1ba93a69c4.exe"
    1⤵
    • Drops file in Windows directory
    PID:216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/216-5-0x0000000000B60000-0x0000000000B80000-memory.dmp

    Filesize

    128KB

  • memory/216-1-0x0000000004110000-0x000000000413F000-memory.dmp

    Filesize

    188KB

  • memory/216-0-0x0000000000B60000-0x0000000000B80000-memory.dmp

    Filesize

    128KB

  • memory/216-12-0x0000000000B60000-0x0000000000B80000-memory.dmp

    Filesize

    128KB