Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-05-2022 14:08
Behavioral task
behavioral1
Sample
1340-59-0x0000000000400000-0x000000000042B000-memory.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1340-59-0x0000000000400000-0x000000000042B000-memory.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1340-59-0x0000000000400000-0x000000000042B000-memory.exe
-
Size
172KB
-
MD5
834f5c6f32052fe3a63179e4902ea42c
-
SHA1
e0ab4543cd4ce2b280c351fa80b22ccfb841b0e9
-
SHA256
102603789a44288fe4f55633978e283f2ad7dd77b6648f9556506f2079a5c33b
-
SHA512
d66db277736ec764da1426ff7ab2070f751af2763ca6edff5834cf0f26acf6fc45bb9ef13bd66bba26c958771de46e4aa6f509b2272c5694f23b641c84f84f1d
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1340-59-0x0000000000400000-0x000000000042B000-memory.exepid process 1504 1340-59-0x0000000000400000-0x000000000042B000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1504-54-0x0000000000AA0000-0x0000000000DA3000-memory.dmpFilesize
3.0MB