Analysis

  • max time kernel
    37s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    26-05-2022 05:19

General

  • Target

    1108-63-0x0000000000400000-0x000000000042B000-memory.exe

  • Size

    172KB

  • MD5

    f863016e2c091642878234d4068f98c3

  • SHA1

    64eb10e4d44af1ebd0d5c48747627b4c6f47ae50

  • SHA256

    d5090d6f49f23fb2183d4149755a6212fda3dc9dc9f0da7269118d97929be469

  • SHA512

    513af344da95e69be39afb6165b15ae46a1b190944800227f6c8c784320a425cbb31fd36e5cb07b3cad315c01a8a8e6ebde99c615309dbc4d88dcfa58989d1af

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1108-63-0x0000000000400000-0x000000000042B000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1108-63-0x0000000000400000-0x000000000042B000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:548

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/548-54-0x0000000000770000-0x0000000000A73000-memory.dmp
    Filesize

    3.0MB