Analysis

  • max time kernel
    132s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    15-03-2022 21:18

General

  • Target

    1932-63-0x0000000000400000-0x0000000000429000-memory.exe

  • Size

    164KB

  • MD5

    87e92fd765c4660771e4a70a396c5b6d

  • SHA1

    f3c7af1ffef3fe22a176fd73ed865b5303c2ba27

  • SHA256

    c9506fe4bd60abb409df70c0870b28a1aed8960284fd42e02d883ba887928aea

  • SHA512

    cc8c079ff4429f82800557b158f4d8f7e643721d524a3e0c87bdd906cdaf1a0a7533716c626ef66bde4bb2b177e398746b7e0eedb4a8c28fa7f16a3c5fa24fb8

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1932-63-0x0000000000400000-0x0000000000429000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1932-63-0x0000000000400000-0x0000000000429000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2100-130-0x0000000001310000-0x000000000165A000-memory.dmp
    Filesize

    3.3MB