Analysis

  • max time kernel
    31s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    29-05-2022 20:41

General

  • Target

    0d69b8bd03f0c70752992fa7e5930cb145d846fa71f3d6beb1685041508647ca.exe

  • Size

    650KB

  • MD5

    4b563410a2dd06e3a48625312bb032d9

  • SHA1

    a171d2052702eae83b0d4f7aa7d29af6e47b20fb

  • SHA256

    0d69b8bd03f0c70752992fa7e5930cb145d846fa71f3d6beb1685041508647ca

  • SHA512

    387669e0baacf3f88065773f65122f33c14715bbf34a04220c3f96d467d3b93de3eec580f785e603ef6431a92fc9f6f6c2b6e1ee0ae5b10ef648bf179b05d04f

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d69b8bd03f0c70752992fa7e5930cb145d846fa71f3d6beb1685041508647ca.exe
    "C:\Users\Admin\AppData\Local\Temp\0d69b8bd03f0c70752992fa7e5930cb145d846fa71f3d6beb1685041508647ca.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1792-54-0x0000000075C51000-0x0000000075C53000-memory.dmp
    Filesize

    8KB