Analysis
-
max time kernel
80s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
03-04-2022 12:14
Behavioral task
behavioral1
Sample
1556-59-0x0000000000400000-0x0000000000429000-memory.exe
Resource
win7-20220331-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1556-59-0x0000000000400000-0x0000000000429000-memory.exe
Resource
win10v2004-20220331-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1556-59-0x0000000000400000-0x0000000000429000-memory.exe
-
Size
164KB
-
MD5
dc26f912ddfbd375c3ab80c3be5fd50f
-
SHA1
7f26154d452f0bb2ed065481ae3a23d1aa98173e
-
SHA256
bcd367e23b9e5f2aab667e9298ce649a7922c6fba753253f295cf3d2bfd677a6
-
SHA512
034504f5fad9b32f021265ecbfa87861eb18957a930f28a08a4fc8a50c286227d30c8b4343769137c0f31f309c3b65d92e363713b4488a2e227d57caef1b08ae
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1556-59-0x0000000000400000-0x0000000000429000-memory.exepid process 1360 1556-59-0x0000000000400000-0x0000000000429000-memory.exe 1360 1556-59-0x0000000000400000-0x0000000000429000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1360-124-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB