Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 21:41

General

  • Target

    7b8681b10a3ef3149f466f926f01608b3bed08acb5dbc4a632ff4fdf62b901e4.exe

  • Size

    492KB

  • MD5

    c7522551704c62a451c60e578fc07240

  • SHA1

    480b81ee4ca796df93d5c53f510cdca51fc04c30

  • SHA256

    7b8681b10a3ef3149f466f926f01608b3bed08acb5dbc4a632ff4fdf62b901e4

  • SHA512

    d23721dae95a0660bf5fd383152e9bccfb6fc1b2f98b2d8ce4612e5776ae7726b5f92d692e69a54fbb693867bb9078f595954f5f086a781ddf37d7bdc33f270d

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b8681b10a3ef3149f466f926f01608b3bed08acb5dbc4a632ff4fdf62b901e4.exe
    "C:\Users\Admin\AppData\Local\Temp\7b8681b10a3ef3149f466f926f01608b3bed08acb5dbc4a632ff4fdf62b901e4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4800

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4800-0-0x0000000000896000-0x0000000000897000-memory.dmp
    Filesize

    4KB

  • memory/4800-1-0x0000000002350000-0x0000000002351000-memory.dmp
    Filesize

    4KB