Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 01:37

General

  • Target

    230cb6fd476f527171225b13508dc494.exe

  • Size

    287KB

  • MD5

    230cb6fd476f527171225b13508dc494

  • SHA1

    8e970d25596b73b1fd16d2d6712fda0a78d3a2e8

  • SHA256

    07abd36534ec01f6fb90998c4043105f08fd330b9664936b3e232a1bd3c07033

  • SHA512

    b02268c5ea258c45fb0523defdfd50cd03895fc1d9788059a78a6254cfe6bd6b34547de79b87b6551f6cc834e752d81e528cec5bffce3af2ecf4511940ae421b

  • SSDEEP

    3072:U9cm/GGbEzw9W202C10PM7QYZ0K9xR1dWGjn2edDosm4iDO88VsgIPHtnDng7:U9FnoM82wwM7Q+0Mf11xKDO8P7PRjC

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\230cb6fd476f527171225b13508dc494.exe
    "C:\Users\Admin\AppData\Local\Temp\230cb6fd476f527171225b13508dc494.exe"
    1⤵
    • Drops file in Windows directory
    PID:3980

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3980-0-0x0000000000DE0000-0x0000000000EE0000-memory.dmp

          Filesize

          1024KB

        • memory/3980-2-0x0000000001F50000-0x0000000001F7F000-memory.dmp

          Filesize

          188KB