Analysis

  • max time kernel
    158s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 14:23

General

  • Target

    1b51d88c1199e108fbdce8a73b4ae483.exe

  • Size

    19KB

  • MD5

    1b51d88c1199e108fbdce8a73b4ae483

  • SHA1

    d3e8306f783a75149628dace618b5f6d39df5e81

  • SHA256

    d96c545aa11b2eb295b541af8b7cb5582b54c5b7f8dffcae7794452b932ce371

  • SHA512

    c9c1a48d7198a3c0639fe1a194d865fb23dea57620cb11216f75514f1764edc8f663cca9a5adea61113e229b2f7d2f6aed5e612949f8a11031be5231103af187

  • SSDEEP

    384:kRdCyfMqlW2mQmENrr8c52YS7iV6oOCAz+D+8:4CyUqlvmQj184y7Wbc9

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b51d88c1199e108fbdce8a73b4ae483.exe
    "C:\Users\Admin\AppData\Local\Temp\1b51d88c1199e108fbdce8a73b4ae483.exe"
    1⤵
    • Drops file in Windows directory
    PID:1548

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\jay.exe

    Filesize

    103B

    MD5

    29990615df89dcb925bad5b323d30f53

    SHA1

    6c64dfa06aeaddffdd48bf639a0f335a5fc3adb7

    SHA256

    5bfe3247267eda046b15c68af89d48f19208aa49e456d082669c2b159d714f59

    SHA512

    8f763539b4eef910b3534e590a6e88e17f7473bb08696d8c0b06442be2fda45687bae6f68edcde2c10cd99cb7c9ed8f95b43b81d04eb1c2dc304330469b30794

  • memory/1548-13-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-16-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-8-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-9-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-10-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-11-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-7-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-14-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-12-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-15-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-17-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-18-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-19-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1548-20-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB