Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 04:55

General

  • Target

    58084981e63d6f7dea28197338e5c159.exe

  • Size

    47KB

  • MD5

    58084981e63d6f7dea28197338e5c159

  • SHA1

    838396a169d5a530151055d1a2770f59892fa9ff

  • SHA256

    ec2fe433e3ceccf14bdb551f2bd963cd0a2b6342b228ac884e0b24244da3b7f1

  • SHA512

    e0c28718ee35088d85e0b4e869168c4820f014b819fa6fb222a694e00c005357e3c258b84f3c4d4d06db9f3a9124b1fff6f4bb6339dea77ece0b2594a517b4c2

  • SSDEEP

    768:vyDX6EH7dv774yndQ47ExYE7SoPAEc893eh1BDqsG3dut3nYdNZL1Xv:vWXb3tdP4xdSoPp9uVDlG0hYdNZL1

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58084981e63d6f7dea28197338e5c159.exe
    "C:\Users\Admin\AppData\Local\Temp\58084981e63d6f7dea28197338e5c159.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: RenamesItself
    PID:3640

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3640-0-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/3640-1-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/3640-11-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/3640-12-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB