Analysis

  • max time kernel
    139s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 17:27

General

  • Target

    512a7999ac5308168e19efd8832fd473.exe

  • Size

    287KB

  • MD5

    512a7999ac5308168e19efd8832fd473

  • SHA1

    5354bca0a23aa7a9b3e7b0f5fbec28a7de630619

  • SHA256

    107a841486c3f1e952be7bee569a0dcfc85d6f6ccbad20f97fc4bb6d2f5fc94c

  • SHA512

    e5a249ed085ed4d8a428b350ecffd868c6a39247104d46badfaec263863c8c90bc20d62e15d37600ebbbaca58df46639b0a89f5dd310103d051bded16fd5fee1

  • SSDEEP

    6144:J/Jsi7tRTKhIOeNS7kc99ptMoW71riAso16YoHTeZHhwG:Xsi7/TKhIOiS7v9jGRmA9MYoHT42G

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\512a7999ac5308168e19efd8832fd473.exe
    "C:\Users\Admin\AppData\Local\Temp\512a7999ac5308168e19efd8832fd473.exe"
    1⤵
    • Drops file in Windows directory
    PID:2612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2612-0-0x0000000000CB0000-0x0000000000DB0000-memory.dmp

    Filesize

    1024KB

  • memory/2612-2-0x0000000000E70000-0x0000000000E9F000-memory.dmp

    Filesize

    188KB