Analysis

  • max time kernel
    137s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 09:44

General

  • Target

    7ccd44a17b9167fa943885e1b402de1a.exe

  • Size

    6KB

  • MD5

    7ccd44a17b9167fa943885e1b402de1a

  • SHA1

    1efbc0172f7f34187654ed7c9791b19d4ebd8ed7

  • SHA256

    8ecc08f8d4df34ff9cc4204a6a509c54f15e597168da78de2b3e686849210ba1

  • SHA512

    38f51673e92d8fd9fb12a3a7c6569a9935e6f881e8ebe7782137d45a3fc78e347b1992d5102d32328bb1d6f2df2566447c7254f724c3a52f5e10ddeeb0b9520e

  • SSDEEP

    96:btebdwXmWSerMFXty/cg11ibiZZ3+SAKjoEDMJcycb1Aaek/:xOwSerQXtynWbgZ3+SQcyeek/

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ccd44a17b9167fa943885e1b402de1a.exe
    "C:\Users\Admin\AppData\Local\Temp\7ccd44a17b9167fa943885e1b402de1a.exe"
    1⤵
    • Drops file in System32 directory
    PID:956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads