Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-05-2022 07:02
Behavioral task
behavioral1
Sample
1864-75-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1864-75-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1864-75-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
42b4767fa58337b116f334d52d8dab4b
-
SHA1
b1623d645b931c33821f9c9276302087a5814b1b
-
SHA256
c654fa72f42b999a903342835dac93dcd108118c9c3bddf8c7e270ebe39224df
-
SHA512
cf24392bd6d822c7e816285a2430b12ffd48ec7f6c5834c11086bdae8f4c53ceae8d8ec5745c627863731aa6f1e83e7b51331af5e75fd1fe4ea39cc5dfa18e3c
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1864-75-0x0000000000400000-0x000000000042F000-memory.exepid process 2480 1864-75-0x0000000000400000-0x000000000042F000-memory.exe 2480 1864-75-0x0000000000400000-0x000000000042F000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2480-130-0x0000000001130000-0x000000000147A000-memory.dmpFilesize
3.3MB