Analysis

  • max time kernel
    9s
  • max time network
    8s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-03-2021 09:51

General

  • Target

    240387329dee4f03f98a89a2feff9bf30dcba61fcf614cdac24129da54442762.exe

  • Size

    402KB

  • MD5

    0c4374d72e166f15acdfe44e9398d026

  • SHA1

    f8ac123e604137654759f2fbc4c5957d5881d3d1

  • SHA256

    240387329dee4f03f98a89a2feff9bf30dcba61fcf614cdac24129da54442762

  • SHA512

    76cd020e4944cd3de7da34297b320e72108759e204a92f0952e0045a4dfeaeb3ec7ee3f96d7a2a1b0c580c6cee56f6abdd5d84eec4e2182baae2fb1924812235

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\240387329dee4f03f98a89a2feff9bf30dcba61fcf614cdac24129da54442762.exe
    "C:\Users\Admin\AppData\Local\Temp\240387329dee4f03f98a89a2feff9bf30dcba61fcf614cdac24129da54442762.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1904-3-0x0000000002520000-0x0000000002531000-memory.dmp

    Filesize

    68KB

  • memory/1904-2-0x0000000002110000-0x0000000002121000-memory.dmp

    Filesize

    68KB

  • memory/1904-4-0x0000000002110000-0x0000000002121000-memory.dmp

    Filesize

    68KB