Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 13:20

General

  • Target

    a1f4017af1a7e0abb096fe6f8775ff2c.exe

  • Size

    313KB

  • MD5

    a1f4017af1a7e0abb096fe6f8775ff2c

  • SHA1

    f45c9065426e35c35ec288439064f625bca28d06

  • SHA256

    58fec3bc81a2db9b96fb17258fabcd774b5b217b65c9ef889de698bd0429fcc6

  • SHA512

    ac9264f1e810aaf3cb8793efd081bc9503d0f41e6b591fccc648cf2d7a85748fe6219dd029d522267d9d10be70807af0125ebb6f907feed2e3d79dc64a672dd7

  • SSDEEP

    3072:72qkDquknQ+bxxPd7zAIRfcxkJFRanLhlA/J4fV4In/pcg53vs/Inb:72k7jdWxkJULs/J494I/3Rn

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1f4017af1a7e0abb096fe6f8775ff2c.exe
    "C:\Users\Admin\AppData\Local\Temp\a1f4017af1a7e0abb096fe6f8775ff2c.exe"
    1⤵
    • Drops file in Program Files directory
    PID:5004

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5004-0-0x0000000000400000-0x0000000000471000-memory.dmp

          Filesize

          452KB

        • memory/5004-1-0x0000000000620000-0x0000000000622000-memory.dmp

          Filesize

          8KB

        • memory/5004-2-0x0000000000660000-0x0000000000661000-memory.dmp

          Filesize

          4KB

        • memory/5004-5-0x0000000000400000-0x0000000000471000-memory.dmp

          Filesize

          452KB

        • memory/5004-7-0x0000000000620000-0x0000000000622000-memory.dmp

          Filesize

          8KB