Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26-05-2022 05:19
Behavioral task
behavioral1
Sample
1108-63-0x0000000000400000-0x000000000042B000-memory.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1108-63-0x0000000000400000-0x000000000042B000-memory.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1108-63-0x0000000000400000-0x000000000042B000-memory.exe
-
Size
172KB
-
MD5
f863016e2c091642878234d4068f98c3
-
SHA1
64eb10e4d44af1ebd0d5c48747627b4c6f47ae50
-
SHA256
d5090d6f49f23fb2183d4149755a6212fda3dc9dc9f0da7269118d97929be469
-
SHA512
513af344da95e69be39afb6165b15ae46a1b190944800227f6c8c784320a425cbb31fd36e5cb07b3cad315c01a8a8e6ebde99c615309dbc4d88dcfa58989d1af
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1108-63-0x0000000000400000-0x000000000042B000-memory.exepid process 1088 1108-63-0x0000000000400000-0x000000000042B000-memory.exe 1088 1108-63-0x0000000000400000-0x000000000042B000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1088-130-0x0000000000F20000-0x000000000126A000-memory.dmpFilesize
3.3MB