Analysis

  • max time kernel
    140s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-03-2024 14:03

General

  • Target

    cb984c242f8634389ce8660fcc75435a.exe

  • Size

    226KB

  • MD5

    cb984c242f8634389ce8660fcc75435a

  • SHA1

    bbd3925e4916b24e384c868097761b878a379afc

  • SHA256

    20b8b524f7d729cac6a4730f10bcf0f783e43e2c87b441113cc0e922b13b94a9

  • SHA512

    be160210c0d5c879f27c45ce4adb6445e522eff4c9160d6aff376dbc11e606de3eed8046e2d4908dc8078e93090173f38d3715a4a99786bcbe18785af21da1ef

  • SSDEEP

    6144:EdbOphYVHCP39PclsXoAZCPMiMfV1HplmEHv/PaY:8ORPhdIMfVNy+XPaY

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb984c242f8634389ce8660fcc75435a.exe
    "C:\Users\Admin\AppData\Local\Temp\cb984c242f8634389ce8660fcc75435a.exe"
    1⤵
    • Drops file in Windows directory
    PID:556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/556-0-0x00000000008A0000-0x00000000008A1000-memory.dmp

    Filesize

    4KB

  • memory/556-2-0x00000000008D0000-0x00000000008D1000-memory.dmp

    Filesize

    4KB

  • memory/556-1-0x00000000008B0000-0x00000000008B1000-memory.dmp

    Filesize

    4KB

  • memory/556-3-0x00000000008C0000-0x00000000008C1000-memory.dmp

    Filesize

    4KB

  • memory/556-4-0x00000000008E0000-0x00000000008E1000-memory.dmp

    Filesize

    4KB

  • memory/556-5-0x00000000008F0000-0x0000000000910000-memory.dmp

    Filesize

    128KB

  • memory/556-6-0x0000000001120000-0x000000000114F000-memory.dmp

    Filesize

    188KB

  • memory/556-10-0x00000000008F0000-0x0000000000910000-memory.dmp

    Filesize

    128KB

  • memory/556-18-0x00000000008F0000-0x0000000000910000-memory.dmp

    Filesize

    128KB