Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 06:06

General

  • Target

    cd4e22013b19b65feb2ab96421aceca3.exe

  • Size

    234KB

  • MD5

    cd4e22013b19b65feb2ab96421aceca3

  • SHA1

    cb76d15676239253ca8c88cd3ebf92e270534afa

  • SHA256

    0436d161068a2912191dde9ad0f5f5dc2ca64370d4b645b9822c4279c58699be

  • SHA512

    34db70be218e5692fa71bbd38c6766dcb0ef38a0dca88dc8dd2de35e27cf4536af8acec1eddd697cbdfa194982f4cc122e2a1331164ee425a3a1ee1afef56216

  • SSDEEP

    3072:uqwmOGqM8OROAO5UTS7vdWcoWxg7YjcZJQgh9/J:uq0M8OQAO5WSocVxgGcj/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd4e22013b19b65feb2ab96421aceca3.exe
    "C:\Users\Admin\AppData\Local\Temp\cd4e22013b19b65feb2ab96421aceca3.exe"
    1⤵
    • Drops file in Windows directory
    PID:4996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4996-0-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/4996-5-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB