Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06-06-2022 16:45
Behavioral task
behavioral1
Sample
1892-134-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1892-134-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1892-134-0x0000000000400000-0x000000000042C000-memory.exe
-
Size
176KB
-
MD5
1b6e4a165624e9f6f74d4ce36fd91858
-
SHA1
a90cc75f46c114bbd35c87a99390acc44693d364
-
SHA256
0b6c001f271ee7a496b19120fde4a4aa7453a7bcbc9532adc7890463805140a6
-
SHA512
485f302de65e11230bcbf69ba40ce75833fd43c75f096b66f2569e409957fa1fe466f753924ef5ad1a4b34be530be4402c872146987f0bab99d4daf7a711a3e4
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1892-134-0x0000000000400000-0x000000000042C000-memory.exepid process 1976 1892-134-0x0000000000400000-0x000000000042C000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1976-54-0x00000000008C0000-0x0000000000BC3000-memory.dmpFilesize
3.0MB