Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 19:04

General

  • Target

    1268-64-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    afca526baa3551d847835320444a4fdf

  • SHA1

    9e5bb70f6648f5956d80bfd2019c7a3f59e16d70

  • SHA256

    c694ac48d98534d80ff69273d6ee38f03a52b249e2320de730e9adc62ba1c1f1

  • SHA512

    073542a6045a607bdca85dfb92438ac2cbd9ac6dcb338d37268f7a7fb19f5909617fa15350e6ee6be46ff6c262a1dd2c7a88332da908076643eff2cbbb1fb005

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1268-64-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1268-64-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1540-130-0x0000000000F30000-0x000000000127A000-memory.dmp
    Filesize

    3.3MB