Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2024 16:29

General

  • Target

    987f43dff053ca7aedd6cef3fe0648fc.exe

  • Size

    220KB

  • MD5

    987f43dff053ca7aedd6cef3fe0648fc

  • SHA1

    ed6dce82dbcfde5bbfb0279cc1057e11dcf794a5

  • SHA256

    116771c04ebf121c4cddc0e4e7892caa9484a29196c8ca38bd2275efae359a4b

  • SHA512

    8eae878de9d22c071812b52b75433109be703b5e6b552bd6f426a974e5689796c528caf05b7f4229b252d3087246bd6c36b0145b1889cc0fd796f0849a559f37

  • SSDEEP

    6144:KQ0Ti4mkiu95rWxH52wWnkNlQo1bsva0iL:++4mcWxZ2wLNlZlgLiL

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\987f43dff053ca7aedd6cef3fe0648fc.exe
    "C:\Users\Admin\AppData\Local\Temp\987f43dff053ca7aedd6cef3fe0648fc.exe"
    1⤵
    • Drops file in Windows directory
    PID:2648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2648-1-0x00000000012C0000-0x00000000012C1000-memory.dmp

    Filesize

    4KB

  • memory/2648-2-0x00000000012D0000-0x00000000012D1000-memory.dmp

    Filesize

    4KB

  • memory/2648-0-0x00000000012B0000-0x00000000012B1000-memory.dmp

    Filesize

    4KB

  • memory/2648-3-0x00000000012E0000-0x00000000012E1000-memory.dmp

    Filesize

    4KB

  • memory/2648-4-0x00000000012F0000-0x0000000001310000-memory.dmp

    Filesize

    128KB

  • memory/2648-5-0x00000000048A0000-0x00000000048CF000-memory.dmp

    Filesize

    188KB

  • memory/2648-9-0x00000000012F0000-0x0000000001310000-memory.dmp

    Filesize

    128KB

  • memory/2648-17-0x00000000012F0000-0x0000000001310000-memory.dmp

    Filesize

    128KB