Analysis

  • max time kernel
    10s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    20-04-2021 12:04

General

  • Target

    b4e443daba6d844cfaba63ca17ff5a09.exe

  • Size

    181KB

  • MD5

    b4e443daba6d844cfaba63ca17ff5a09

  • SHA1

    b1d7f9c5c94858acfeb75b8bdfea38e3c4f01eb6

  • SHA256

    852d3890ed7348734c5f18da1141075129468263b43f82cec8ac7b3e4b9145ac

  • SHA512

    53a5f8b1feb147d671497f37032db0010c70d558f047f0370b4de1e825633c71f6ce123bb8b02ebd74e185b514efc48bd88cbbe9272416c34da9b68b4745e4b5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4e443daba6d844cfaba63ca17ff5a09.exe
    "C:\Users\Admin\AppData\Local\Temp\b4e443daba6d844cfaba63ca17ff5a09.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/640-114-0x0000000001530000-0x0000000001850000-memory.dmp
    Filesize

    3.1MB