Analysis

  • max time kernel
    4s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    10-09-2021 11:25

General

  • Target

    d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe

  • Size

    143KB

  • MD5

    a3749c66f65d247d8a6fae1be26d3ef9

  • SHA1

    c394464bba56e62ddfe2c9073932fb656fb78b6c

  • SHA256

    d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c

  • SHA512

    65bc1dba7e4de098e6b27b13b1e0723f703f645e4a4c6e53b7b03ec096a70d48ec2aca7e8bcd911ced61bab35e95983510604421ef35a593278414bfbb1cb01c

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:332

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/332-60-0x0000000075FF1000-0x0000000075FF3000-memory.dmp
    Filesize

    8KB

  • memory/332-62-0x0000000002250000-0x00000000022EF000-memory.dmp
    Filesize

    636KB

  • memory/332-63-0x00000000022F0000-0x000000000241D000-memory.dmp
    Filesize

    1.2MB

  • memory/332-64-0x00000000001A0000-0x00000000001BF000-memory.dmp
    Filesize

    124KB

  • memory/332-65-0x0000000002680000-0x0000000002789000-memory.dmp
    Filesize

    1.0MB

  • memory/332-69-0x0000000000150000-0x0000000000151000-memory.dmp
    Filesize

    4KB

  • memory/332-68-0x0000000000140000-0x0000000000141000-memory.dmp
    Filesize

    4KB

  • memory/332-70-0x0000000000160000-0x0000000000166000-memory.dmp
    Filesize

    24KB

  • memory/332-67-0x0000000000130000-0x0000000000131000-memory.dmp
    Filesize

    4KB

  • memory/332-66-0x0000000000120000-0x000000000012A000-memory.dmp
    Filesize

    40KB