Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2024 13:45

General

  • Target

    c3845f3760a997f07eda1732a48b40f8.exe

  • Size

    224KB

  • MD5

    c3845f3760a997f07eda1732a48b40f8

  • SHA1

    338a452555642b22657306d773056bc9929c41e4

  • SHA256

    06ea1b5bb85a0a3cb0bb6c243443653b94c5ca64c825e051fb9ea6b966a0b1c4

  • SHA512

    a8f428c52c7ff5a5c99966ced2509ec6a6f5370463a5fdef8e28f5208ecd95563b822e23bd7ea33b491da52dd01e5f9a484183dd3e91c9d08cdf966b9ea96eff

  • SSDEEP

    6144:dE2bWW3WBOvaJXS6D17bel6w+cHHC6N0hD5:V6W3VS/D17beri6N0ht

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3845f3760a997f07eda1732a48b40f8.exe
    "C:\Users\Admin\AppData\Local\Temp\c3845f3760a997f07eda1732a48b40f8.exe"
    1⤵
    • Drops file in Windows directory
    PID:1400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1400-0-0x0000000001160000-0x0000000001170000-memory.dmp

    Filesize

    64KB

  • memory/1400-2-0x0000000001130000-0x0000000001140000-memory.dmp

    Filesize

    64KB

  • memory/1400-1-0x0000000001A20000-0x0000000001A30000-memory.dmp

    Filesize

    64KB

  • memory/1400-3-0x0000000000E20000-0x0000000000E40000-memory.dmp

    Filesize

    128KB

  • memory/1400-4-0x00000000019D0000-0x00000000019FF000-memory.dmp

    Filesize

    188KB

  • memory/1400-8-0x0000000000E20000-0x0000000000E40000-memory.dmp

    Filesize

    128KB

  • memory/1400-16-0x0000000000E20000-0x0000000000E40000-memory.dmp

    Filesize

    128KB