Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2024 17:37

General

  • Target

    877b923862a8fe0f3b4e54a90992d7b9.exe

  • Size

    222KB

  • MD5

    877b923862a8fe0f3b4e54a90992d7b9

  • SHA1

    22cc916a15bb792ed5475f250430af021ab5d650

  • SHA256

    05990eda39506d6e8b8e19c02981d1f0260953732da27e3d43b7f12e0c541820

  • SHA512

    ad592efd223c02e4b16962a4776188f836c7f2744a0fd244cb3830fcfe0a3438caf1e5d77f1e644544b2c5577b80f81381fc7cd1424a30a44e9db5aad3d1e1a9

  • SSDEEP

    6144:U1oAzAIHTVSqbGlt05D81RWUyPaCywlXVG:UxjHJi05DKWQwlXVG

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\877b923862a8fe0f3b4e54a90992d7b9.exe
    "C:\Users\Admin\AppData\Local\Temp\877b923862a8fe0f3b4e54a90992d7b9.exe"
    1⤵
    • Drops file in Windows directory
    PID:2108

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2108-0-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/2108-1-0x0000000000D80000-0x0000000000D81000-memory.dmp

    Filesize

    4KB

  • memory/2108-2-0x0000000000DA0000-0x0000000000DA1000-memory.dmp

    Filesize

    4KB

  • memory/2108-3-0x0000000000D90000-0x0000000000D91000-memory.dmp

    Filesize

    4KB

  • memory/2108-4-0x0000000000DB0000-0x0000000000DD0000-memory.dmp

    Filesize

    128KB

  • memory/2108-5-0x0000000004A20000-0x0000000004A4F000-memory.dmp

    Filesize

    188KB

  • memory/2108-9-0x0000000000DB0000-0x0000000000DD0000-memory.dmp

    Filesize

    128KB

  • memory/2108-17-0x0000000000DB0000-0x0000000000DD0000-memory.dmp

    Filesize

    128KB