Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2024 10:02

General

  • Target

    uTinyRipper.exe.xml

  • Size

    1KB

  • MD5

    483c48cb27bdd0041b933393c98d8609

  • SHA1

    4b99927122d2d21ce522c8d8ef38c2481d9d82df

  • SHA256

    05b65d43610497cff576db4fc199a56bc08659674238746bc68b671d5f1b864e

  • SHA512

    2cb22d3515fe8bbb6cf2fcecf97591af690a5fe62b529a89512aa60b7139e6bb2f0dab1b5482797d177d23257977bc52c698a964509b87b2d00cf63741393056

Score
1/10

Malware Config

Signatures

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\uTinyRipper.exe.xml"
    1⤵
      PID:4760

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4760-0-0x00007FFD578B0000-0x00007FFD578C0000-memory.dmp

      Filesize

      64KB

    • memory/4760-1-0x00007FFD97830000-0x00007FFD97A25000-memory.dmp

      Filesize

      2.0MB

    • memory/4760-2-0x00007FFD97830000-0x00007FFD97A25000-memory.dmp

      Filesize

      2.0MB

    • memory/4760-3-0x00007FFD95470000-0x00007FFD95739000-memory.dmp

      Filesize

      2.8MB

    • memory/4760-4-0x00007FFD578B0000-0x00007FFD578C0000-memory.dmp

      Filesize

      64KB

    • memory/4760-5-0x00007FFD97830000-0x00007FFD97A25000-memory.dmp

      Filesize

      2.0MB