Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2024 04:56

General

  • Target

    5a57402773f7b2055c8528a44894c14e.exe

  • Size

    55KB

  • MD5

    5a57402773f7b2055c8528a44894c14e

  • SHA1

    80f5bde91700267f9beeecf363ba59beaca1a9f2

  • SHA256

    bbc321e6eba149ec4103ac32b7ffcb1f6297f9f35c001149c75d033f4444e257

  • SHA512

    4dea98469880285b3584d2997d37655518f0084a8db7283eefa81be36e84bb686aa76f371f3b0546118c8ba36bc85e84e8c1d6dcdaf2f027cdea87b26dd0ff6c

  • SSDEEP

    1536:NQ56/eLLlTV/mGLfK+P/Rrh0anLF4vqUtrq+CbVj/kI7voN3NVNFcRbsENDYEQ2Q:NsDFS4VJ5q0G

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a57402773f7b2055c8528a44894c14e.exe
    "C:\Users\Admin\AppData\Local\Temp\5a57402773f7b2055c8528a44894c14e.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NO_PWDS_report_14-01-2024_04-56-36-676269B6-IJDG.bin

    Filesize

    1KB

    MD5

    9f262b69dbfbf1b0165b626a4a0e2e64

    SHA1

    9b8ee011ec868d909f50ade762a52c0bfefd424b

    SHA256

    c95252dbc6ecb5d2e3b9a36e1563412f231e38220266d6c4d4cbe1d0dcc12d65

    SHA512

    053f35a4f49c715e684c91867559a5a473209d134ac4448437a5bb1ccfbd2ff15f4cc5a84e012d13b0d52449cb88a63934fca4c61f15fba1fc574a79e998fb9f

  • memory/1196-0-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1196-10-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB