Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 03:35

General

  • Target

    59d100b61c4290bb83b6fc9082cf3e50N.exe

  • Size

    144KB

  • MD5

    59d100b61c4290bb83b6fc9082cf3e50

  • SHA1

    1ac3133b5edbab1c287be6904e994cf51898f4b6

  • SHA256

    a672614cdbbf155d086ffc74e7f3c495df821520e37994227c1cb46ed24f5336

  • SHA512

    63873641cf4540c5ab54ae836f2c87b615cdd508b706846fb19f233b7c95f501eefcde25c6a0a6c83d365cd99e6836c9a3e51896a03a1c9e3bbc8ba2efed4a1a

  • SSDEEP

    3072:dTA5RboLmKdKphh+9FzjSyQJ50sCrv5eTzQP8sACLk+:q9oLmKdKA9FCH5IReTUUT

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59d100b61c4290bb83b6fc9082cf3e50N.exe
    "C:\Users\Admin\AppData\Local\Temp\59d100b61c4290bb83b6fc9082cf3e50N.exe"
    1⤵
    • Modifies system certificate store
    PID:3408

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Tmp79C4.tmp

          Filesize

          4KB

          MD5

          a75b2c0be68880232785156929ebabb9

          SHA1

          f61acdab992008cac3bf7ae938a52d9083b3d8ca

          SHA256

          d8afc553b196b2cf9b7e56c23b5a774f5f886462c992964b1e4da9b2df471601

          SHA512

          d295f681a919a7a18b05f437576a2ee911e204416ca3a2ed5e2281f285fa16adcecf9353bbf2060f257879784a14f10e7b522d48c0c9bf9c95d12869005e2c45

        • memory/3408-0-0x000001FE5FD50000-0x000001FE5FD7A000-memory.dmp

          Filesize

          168KB

        • memory/3408-1-0x00007FF99E433000-0x00007FF99E435000-memory.dmp

          Filesize

          8KB

        • memory/3408-18-0x00007FF99E430000-0x00007FF99EEF1000-memory.dmp

          Filesize

          10.8MB

        • memory/3408-20-0x00007FF99E430000-0x00007FF99EEF1000-memory.dmp

          Filesize

          10.8MB