Analysis

  • max time kernel
    139s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    30-05-2022 02:48

General

  • Target

    1316-85-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    4b640f5fa2ba22b34ab7c130ae983985

  • SHA1

    ce2c81e61a344cbfff7d93ddd57f9d32dd9f531f

  • SHA256

    8d3f8777ecbfc84c9e14cc224f98235fb139fae3403df0bb463526e459f4f020

  • SHA512

    223c73f4c6f20b0a421ef0e9e88a83575ffdb01aff0ae31c574feec0442bcab381b00889c901e8ae5c464012989a08ac14351e0056c6e06c9dd49061cb618ea7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1316-85-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1316-85-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2104-130-0x0000000001430000-0x000000000177A000-memory.dmp
    Filesize

    3.3MB