Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 04:20

General

  • Target

    716ee59b7da74f32f43bc7b7417ce6b8.exe

  • Size

    49KB

  • MD5

    716ee59b7da74f32f43bc7b7417ce6b8

  • SHA1

    cef94eb15da0127af6f7d5438fffdac430944593

  • SHA256

    e332e84f4b055cdedad48641b797bcac5c40758ead20cacca110383f28e20c44

  • SHA512

    ca01097e05b3cc89a100b45114fd91c561a1ba9a2f8cc40285ce14697183986d7805b07a69b99c0b265de89b23c134d5acc141eba8cf77b5b1c8750b4960b06a

  • SSDEEP

    768:U1Wli+ip0D/QNY/3GEIPPMo3l616Mm5Vyyyyyyy:UcQmGEcPZGq5

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\716ee59b7da74f32f43bc7b7417ce6b8.exe
    "C:\Users\Admin\AppData\Local\Temp\716ee59b7da74f32f43bc7b7417ce6b8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    PID:3136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4DD2.tmp

    Filesize

    1.2MB

    MD5

    0f6f604cef6823274f0e51096628ef40

    SHA1

    a3f7fdf511c930b1b1e2e44bfc08ce5fb1eb13d3

    SHA256

    c2f25d44ed6bc7f8f35bd443da422155413a65e08f08ff6c67dd61c56be610a3

    SHA512

    ffc9d44850ad88d6034dcb7297c520ec355725bc9a719e2d72995d22f9c8ca2514b235f6fc96ed9709076e3fda318153d92f44f726eb849263c1b88932060042