Analysis

  • max time kernel
    143s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 06:18

General

  • Target

    66e99d218702affafdb71838afc9457b.exe

  • Size

    209KB

  • MD5

    66e99d218702affafdb71838afc9457b

  • SHA1

    422005fe2b41aa6c2166db34ff36f46b0024dd9e

  • SHA256

    43033cf31b516e646194ca793a40b27b9efe537e5638adbefe12ee60ace080aa

  • SHA512

    9b59d77a6b32ef84f6215334d2aa0b8d52f0b4172b89b53741da2061f456714ba3911705cac7931b69d6160ff65dc1636f1ad71e8333a2507280ec516210426d

  • SSDEEP

    3072:GElBweFiTXQvUJwWPZBeAjpOCIJZ3KvRxJuMS31LWeMymGPdx+LiwEOxuNPdbH:tlBw9A03/3wFM3h6xksOwNPdbH

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66e99d218702affafdb71838afc9457b.exe
    "C:\Users\Admin\AppData\Local\Temp\66e99d218702affafdb71838afc9457b.exe"
    1⤵
    • Drops file in Windows directory
    PID:4580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4580-0-0x0000000001080000-0x0000000001090000-memory.dmp

    Filesize

    64KB

  • memory/4580-1-0x0000000001350000-0x0000000001360000-memory.dmp

    Filesize

    64KB

  • memory/4580-2-0x0000000001190000-0x0000000001290000-memory.dmp

    Filesize

    1024KB

  • memory/4580-4-0x0000000001290000-0x00000000012BF000-memory.dmp

    Filesize

    188KB