Resubmissions

09/07/2024, 13:39

240709-qydwdayanf 7

09/07/2024, 07:52

240709-jqdr3swdle 6

09/07/2024, 06:42

240709-hgkzcs1bjl 5

09/07/2024, 06:34

240709-hb2d6azhjn 3

09/07/2024, 05:47

240709-ggxgqa1crh 4

Analysis

  • max time kernel
    140s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 05:47

General

  • Target

    netiougc.exe

  • Size

    52KB

  • MD5

    a8299961e1c35d45363705219e58aef6

  • SHA1

    809f0f42a44184aecb66e25dc99487af6d9e7543

  • SHA256

    8cadcf5b0df1017fed04e4c2b75e54f737a2a9cf0bedd62378b712ce69eec001

  • SHA512

    dfd7d8a5c5ccb689a50f12689e980aeb7b672c456bbdcacf7b4a4dcaa8001592a0db29a75f3dbc5d27f2a61e83287dd35efd2d384814722a3b8b6991fdfdb902

  • SSDEEP

    768:bOUB5gMFFVXSNdmOyrNkcRpP/i9rI6xGjj/3Hxtr:FBB1S7mWc41gv/fr

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\netiougc.exe
    "C:\Users\Admin\AppData\Local\Temp\netiougc.exe"
    1⤵
    • Drops file in Windows directory
    PID:1300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads