Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 19:04
Behavioral task
behavioral1
Sample
1268-64-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1268-64-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
1268-64-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
afca526baa3551d847835320444a4fdf
-
SHA1
9e5bb70f6648f5956d80bfd2019c7a3f59e16d70
-
SHA256
c694ac48d98534d80ff69273d6ee38f03a52b249e2320de730e9adc62ba1c1f1
-
SHA512
073542a6045a607bdca85dfb92438ac2cbd9ac6dcb338d37268f7a7fb19f5909617fa15350e6ee6be46ff6c262a1dd2c7a88332da908076643eff2cbbb1fb005
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1268-64-0x0000000000400000-0x000000000042F000-memory.exepid process 824 1268-64-0x0000000000400000-0x000000000042F000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/824-54-0x0000000000900000-0x0000000000C03000-memory.dmpFilesize
3.0MB