Resubmissions

28-07-2022 16:35

220728-t3rvkshhhq 10

14-10-2020 17:07

201014-44szseh69a 1

Analysis

  • max time kernel
    150s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    14-10-2020 17:07

General

  • Target

    04d8109c6c78055d772c01fefe1e5f48a70f2a65535cff17227b5a2c8506b831.exe

  • Size

    672KB

  • MD5

    01a378b49db5cdae61453520e58fd7a8

  • SHA1

    dc6a61e931d0f74a48b3c38e098f2f28bede28f2

  • SHA256

    04d8109c6c78055d772c01fefe1e5f48a70f2a65535cff17227b5a2c8506b831

  • SHA512

    c3dfa6a82591c09f795395e91d160e894f50e85a6ad44808a5d6fcb6a14c78927baaf856d2b0985732de29f5889c8834e6cc2de6e4182007cbc678c0909136f0

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 294 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04d8109c6c78055d772c01fefe1e5f48a70f2a65535cff17227b5a2c8506b831.exe
    "C:\Users\Admin\AppData\Local\Temp\04d8109c6c78055d772c01fefe1e5f48a70f2a65535cff17227b5a2c8506b831.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads