Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 18:02

General

  • Target

    b551c799a3f1b42f9c8c91ab879d7983.exe

  • Size

    226KB

  • MD5

    b551c799a3f1b42f9c8c91ab879d7983

  • SHA1

    d0762e0aebf4d5bd81dd90e078802ecb8f2e9815

  • SHA256

    0462913af40c15c258e618f02265d46f608b691011317c975e9124d036c2d5c2

  • SHA512

    2369d92384e0afa328b84ee3147d4e2c784b86e6393aaedda262b23070d34cfb1b8c2e7271977588cd01b8e420867a369b05188d59961f707c504467dfefbf26

  • SSDEEP

    3072:xGBDvAHfpS+1Wn5+jr2D5ErwSklrDb2VPwOfHmOzK4Rkakl2qpJ/4nAw780TPtY:eDvypV2D5E1DPwOfGQ/SamxJOo0TPtY

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b551c799a3f1b42f9c8c91ab879d7983.exe
    "C:\Users\Admin\AppData\Local\Temp\b551c799a3f1b42f9c8c91ab879d7983.exe"
    1⤵
    • Drops file in Windows directory
    PID:744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-0-0x00000000012A0000-0x00000000012B0000-memory.dmp

    Filesize

    64KB

  • memory/744-1-0x0000000001290000-0x00000000012A0000-memory.dmp

    Filesize

    64KB

  • memory/744-2-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

    Filesize

    64KB

  • memory/744-3-0x00000000011E0000-0x0000000001200000-memory.dmp

    Filesize

    128KB

  • memory/744-4-0x0000000002150000-0x000000000217F000-memory.dmp

    Filesize

    188KB

  • memory/744-8-0x00000000011E0000-0x0000000001200000-memory.dmp

    Filesize

    128KB

  • memory/744-16-0x00000000011E0000-0x0000000001200000-memory.dmp

    Filesize

    128KB