Analysis

  • max time kernel
    14s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-04-2021 09:34

General

  • Target

    c8b952f70a8dea0a32c18cf42627c2b8059eb66b1bc3a019a21acf4c9f901d74.exe

  • Size

    1.0MB

  • MD5

    0724d40c6e36fcc9212fb1e31d3c52ef

  • SHA1

    e3feca03d24741fdfc1f9bd53bff9b377e8dab23

  • SHA256

    c8b952f70a8dea0a32c18cf42627c2b8059eb66b1bc3a019a21acf4c9f901d74

  • SHA512

    aedcaca6d3756d6cfc34469a4b29dc052f9f90818abfa68ad3cdd4111b64c24c3ac82cd4e93c7a970d26a84ec1e10dd31289486ca444f1b83825f98a17662a7c

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8b952f70a8dea0a32c18cf42627c2b8059eb66b1bc3a019a21acf4c9f901d74.exe
    "C:\Users\Admin\AppData\Local\Temp\c8b952f70a8dea0a32c18cf42627c2b8059eb66b1bc3a019a21acf4c9f901d74.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4448

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads