Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 02:29

General

  • Target

    4c8740d02ff09cb44689e1d2944f8000.exe

  • Size

    448KB

  • MD5

    4c8740d02ff09cb44689e1d2944f8000

  • SHA1

    a43c106c69bd4574b6b0d31d3c26ce87c3cbc4e7

  • SHA256

    edb1bd2a98fb5945f5ee5602b8ca496752d7adeb30f4a15243a9f5d311ae9e5f

  • SHA512

    f4f8f75a3c0d2546b3f3f909f41ed1b46f467d55fa91e8f3ee52dbffd14ebfbf8cfe8d2a60eea630a470a966241d51c7906b7fac6e72a24238602ef8f30dcd74

  • SSDEEP

    12288:p0m3blK36QhuIOyFHxlAaO8ye3/RuXg4:93blO6NWTlAaO8yd

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c8740d02ff09cb44689e1d2944f8000.exe
    "C:\Users\Admin\AppData\Local\Temp\4c8740d02ff09cb44689e1d2944f8000.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Run [1].bat" "
      2⤵
        PID:4232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Run [1].bat

      Filesize

      98B

      MD5

      46b131684a6a4e3f59d7ff2aaa376d96

      SHA1

      d7ba21dd6be5f85c4b33f49df0bab2bb208518f2

      SHA256

      e2fdea2531b6d405755674ef72934b94b1a204540cc7961f5442aa330e682260

      SHA512

      aa9ceed1d452a7b6a96249d9a7a7cf53c6095932f47781c2a891a360a98043ce881a0e0e4eb9d084148f054982590747157239826d4a9d768649c4bfd28677ab