Analysis

  • max time kernel
    4294203s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    06-03-2022 22:19

General

  • Target

    6f85ee591b3feee2cf2fa9275b1c49112a6dafa57047b0e5c75aa71b511b54f1.exe

  • Size

    144KB

  • MD5

    0f6a0d0d9358150d6d686f3758d8cbc8

  • SHA1

    16e75f0897bb298ae27f7404a3cca934ef32e950

  • SHA256

    6f85ee591b3feee2cf2fa9275b1c49112a6dafa57047b0e5c75aa71b511b54f1

  • SHA512

    393c2bedf3df5f21fff9bf93e9a7b5b96e6239ba11f9f2b3c4f9b36ad165871dec3af1de51b5eddaa493a400a9e18946e812850bc53d3933eaad346a2aafe41b

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f85ee591b3feee2cf2fa9275b1c49112a6dafa57047b0e5c75aa71b511b54f1.exe
    "C:\Users\Admin\AppData\Local\Temp\6f85ee591b3feee2cf2fa9275b1c49112a6dafa57047b0e5c75aa71b511b54f1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1784

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1784-54-0x0000000075251000-0x0000000075253000-memory.dmp

    Filesize

    8KB