Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    28-04-2022 08:05

General

  • Target

    4448-133-0x0000000000400000-0x000000000042A000-memory.exe

  • Size

    168KB

  • MD5

    c9c6672a0a42bea8b2473dcbbe0b0dcf

  • SHA1

    c8523d7ad66ce794e653555099ab183f893de4e2

  • SHA256

    4449877bcff1885b6b2862d528094e374c61a107880a153f0bc29463699893bc

  • SHA512

    211dfa5c28b55480a7cf2c5a91dff07d56cbc16b38f62a26ca30f50c620957c50dbf2ebd2ba3a01542aa48249a8df1495278cc974d6af446b5e1540509f65c52

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4448-133-0x0000000000400000-0x000000000042A000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\4448-133-0x0000000000400000-0x000000000042A000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4292-130-0x0000000000DD0000-0x000000000111A000-memory.dmp
    Filesize

    3.3MB