Resubmissions

23/08/2024, 16:00

240823-tf47dsteqe 6

23/08/2024, 15:32

240823-sy293sseld 4

23/08/2024, 15:18

240823-sp1d5athqk 8

23/08/2024, 14:12

240823-rjcv7sydnd 7

23/08/2024, 02:33

240823-c17dta1cpd 7

23/08/2024, 02:11

240823-cmbpzszelg 4

23/08/2024, 02:00

240823-ce59mazbnh 4

23/08/2024, 01:37

240823-b1992a1dmm 5

23/08/2024, 01:24

240823-bsm5jazhpp 5

23/08/2024, 00:51

240823-a7p21awhld 6

Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 02:00

General

  • Target

    netiougc.exe

  • Size

    52KB

  • MD5

    a8299961e1c35d45363705219e58aef6

  • SHA1

    809f0f42a44184aecb66e25dc99487af6d9e7543

  • SHA256

    8cadcf5b0df1017fed04e4c2b75e54f737a2a9cf0bedd62378b712ce69eec001

  • SHA512

    dfd7d8a5c5ccb689a50f12689e980aeb7b672c456bbdcacf7b4a4dcaa8001592a0db29a75f3dbc5d27f2a61e83287dd35efd2d384814722a3b8b6991fdfdb902

  • SSDEEP

    768:bOUB5gMFFVXSNdmOyrNkcRpP/i9rI6xGjj/3Hxtr:FBB1S7mWc41gv/fr

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\netiougc.exe
    "C:\Users\Admin\AppData\Local\Temp\netiougc.exe"
    1⤵
    • Drops file in Windows directory
    PID:5084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads