Analysis

  • max time kernel
    16s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    23-04-2021 09:34

General

  • Target

    a1db42d46f08b66f80d31f85c0a2ec932da4fca72247eacb0574d391ddd3162a.exe

  • Size

    1.5MB

  • MD5

    901d597ab01c445f3dfb198d9d7a449f

  • SHA1

    b8f5dc7d3e51481c43df6c476c75a0d6c5a470a6

  • SHA256

    a1db42d46f08b66f80d31f85c0a2ec932da4fca72247eacb0574d391ddd3162a

  • SHA512

    f16c9594aa8a7d2f4a1530056c8773b0715ca8e2cdb779830f6b0ef91c7b70751e5048b91b21a5baef12afa6dcbf4f632fe334f056724187c92b8338fea8d677

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1db42d46f08b66f80d31f85c0a2ec932da4fca72247eacb0574d391ddd3162a.exe
    "C:\Users\Admin\AppData\Local\Temp\a1db42d46f08b66f80d31f85c0a2ec932da4fca72247eacb0574d391ddd3162a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/308-60-0x0000000075A31000-0x0000000075A33000-memory.dmp
    Filesize

    8KB