Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 05:56

General

  • Target

    add92abb92a0f66a6ae8ba1332b4d543.exe

  • Size

    23KB

  • MD5

    add92abb92a0f66a6ae8ba1332b4d543

  • SHA1

    86de5a7619c6a199fd2e618181eee07e6cdb67e6

  • SHA256

    b3868ee7617bc06ad853c40d223629c522ad3416e3d4e0358aae70207c19a09d

  • SHA512

    f8c8a3bdd27bb39c340ac58adac10355e21d4c4753730c74a0963a2289b6f433e8654696ce095ca2618e2d50f4e53394b9bf26bea95dac01e899bd94cc36e1ed

  • SSDEEP

    384:sqVFnJN7TY8wmcuYG56rX6fQaUUGlG7lS/KfFrEPveVSv/w4CgdnD:sknT/cuB5A6fQaUUTlS/Alcg4L9

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\add92abb92a0f66a6ae8ba1332b4d543.exe
    "C:\Users\Admin\AppData\Local\Temp\add92abb92a0f66a6ae8ba1332b4d543.exe"
    1⤵
    • Drops file in System32 directory
    PID:4444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4444-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4444-1-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4444-2-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4444-3-0x0000000002190000-0x00000000021C0000-memory.dmp

    Filesize

    192KB

  • memory/4444-4-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4444-9-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4444-11-0x0000000002190000-0x00000000021C0000-memory.dmp

    Filesize

    192KB