Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2024 11:30

General

  • Target

    De4dot [Modded ArmDot]/AssemblyServer-CLR40-x64.exe

  • Size

    4KB

  • MD5

    beabd2dbdaee15eb90c5aa10cf7df26b

  • SHA1

    6131aa0449e1cd3d0d51d4d1d5ba73486f8381a7

  • SHA256

    e238499f9c3e7d7da98d15739b524ad3cb765f6ea5197569ba10f38adc9a2905

  • SHA512

    fb1a5ba20e8e08dfe986139d8c292a46109a04d7d7f7d12ee2bd7d2f7df3f0b32f2a352d20ffea528d5b5c4b4761521590acef4cdf9316734f80194fddd2f438

  • SSDEEP

    48:6wdh1CxV4rXXMMG1stP8yn3s4uVyYDyVADyqOKKrR4fNCVCOpfbNtm:BAErXXO1stkyc4urD0vr6kUAzNt

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\De4dot [Modded ArmDot]\AssemblyServer-CLR40-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\De4dot [Modded ArmDot]\AssemblyServer-CLR40-x64.exe"
    1⤵
      PID:3468

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3468-0-0x00007FFA09743000-0x00007FFA09745000-memory.dmp

      Filesize

      8KB

    • memory/3468-1-0x00000231B09B0000-0x00000231B09B6000-memory.dmp

      Filesize

      24KB

    • memory/3468-2-0x00000231B0D70000-0x00000231B0D86000-memory.dmp

      Filesize

      88KB