Analysis
-
max time kernel
1s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-05-2022 12:15
Behavioral task
behavioral1
Sample
2036-63-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2036-63-0x0000000000400000-0x000000000042A000-memory.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
2036-63-0x0000000000400000-0x000000000042A000-memory.exe
-
Size
168KB
-
MD5
30194accfcd16cdcd248e702a757700e
-
SHA1
ebb12e40c58f8ba3aea342bfef18687f265d098c
-
SHA256
f5c867e8f326f7b782ebfd3e54da736c5b851e4eb8c8df68e4ec8a327b2a3900
-
SHA512
98258f1df89582ba46b3c7bfca4038881533079d50f8ec7593f577f3d2ea89c5c2f52c7aa0da190b0ba10f2bcd4950016ae37c777afad520b2ab31357c7af2c0
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2036-63-0x0000000000400000-0x000000000042A000-memory.exepid process 964 2036-63-0x0000000000400000-0x000000000042A000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/964-54-0x0000000000860000-0x0000000000B63000-memory.dmpFilesize
3.0MB