Analysis

  • max time kernel
    90s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    06-06-2022 16:45

General

  • Target

    1892-134-0x0000000000400000-0x000000000042C000-memory.exe

  • Size

    176KB

  • MD5

    1b6e4a165624e9f6f74d4ce36fd91858

  • SHA1

    a90cc75f46c114bbd35c87a99390acc44693d364

  • SHA256

    0b6c001f271ee7a496b19120fde4a4aa7453a7bcbc9532adc7890463805140a6

  • SHA512

    485f302de65e11230bcbf69ba40ce75833fd43c75f096b66f2569e409957fa1fe466f753924ef5ad1a4b34be530be4402c872146987f0bab99d4daf7a711a3e4

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1892-134-0x0000000000400000-0x000000000042C000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1892-134-0x0000000000400000-0x000000000042C000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2468-130-0x00000000009C0000-0x0000000000D0A000-memory.dmp
    Filesize

    3.3MB