Resubmissions

28-07-2022 16:39

220728-t6bb1ahda2 10

16-07-2021 22:31

210716-l6k84jnr1j 1

Analysis

  • max time kernel
    150s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    16-07-2021 22:31

General

  • Target

    e001f6a5b2d4d2659b010fb5825eb4383e8f415861a244329bc70cfcd18da507.bin.exe

  • Size

    672KB

  • MD5

    23755a33694adc76023dd0b7607bc03d

  • SHA1

    33a68ea32f34ab635a7f6ce6d39cf48e97329031

  • SHA256

    e001f6a5b2d4d2659b010fb5825eb4383e8f415861a244329bc70cfcd18da507

  • SHA512

    aa179e18c61514e0ea93fe0d3813af4d788b1f7c8fe20987e3d0316b77478f9afb6af3f9cd1797903b955b1a623e495c4f00c384957e93f1037fc45fb312ab58

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e001f6a5b2d4d2659b010fb5825eb4383e8f415861a244329bc70cfcd18da507.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\e001f6a5b2d4d2659b010fb5825eb4383e8f415861a244329bc70cfcd18da507.bin.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3008-114-0x00000000014B0000-0x00000000015FA000-memory.dmp

    Filesize

    1.3MB