Analysis

  • max time kernel
    47s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-06-2022 05:30

General

  • Target

    1ce17200496c6ffbbfe6220fa147f7599edce5a4dfb27a0afe14e072ceca5eb6.exe

  • Size

    167KB

  • MD5

    349d6af6f1710decfcb42a6a6ce1c15e

  • SHA1

    817e215be884c50e0e115e106fd41fc9d5224359

  • SHA256

    1ce17200496c6ffbbfe6220fa147f7599edce5a4dfb27a0afe14e072ceca5eb6

  • SHA512

    a61395ccc543a622537e5c0e88fc3586ca70ea193f4e60f17f377334d6881ba58c09c4496d39e6874defde7852868bc95b7e2cf4feff90800dec89c271bcb908

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ce17200496c6ffbbfe6220fa147f7599edce5a4dfb27a0afe14e072ceca5eb6.exe
    "C:\Users\Admin\AppData\Local\Temp\1ce17200496c6ffbbfe6220fa147f7599edce5a4dfb27a0afe14e072ceca5eb6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1512-54-0x0000000000750000-0x0000000000A53000-memory.dmp
    Filesize

    3.0MB