Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    07-06-2022 05:30

General

  • Target

    1ce17200496c6ffbbfe6220fa147f7599edce5a4dfb27a0afe14e072ceca5eb6.exe

  • Size

    167KB

  • MD5

    349d6af6f1710decfcb42a6a6ce1c15e

  • SHA1

    817e215be884c50e0e115e106fd41fc9d5224359

  • SHA256

    1ce17200496c6ffbbfe6220fa147f7599edce5a4dfb27a0afe14e072ceca5eb6

  • SHA512

    a61395ccc543a622537e5c0e88fc3586ca70ea193f4e60f17f377334d6881ba58c09c4496d39e6874defde7852868bc95b7e2cf4feff90800dec89c271bcb908

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ce17200496c6ffbbfe6220fa147f7599edce5a4dfb27a0afe14e072ceca5eb6.exe
    "C:\Users\Admin\AppData\Local\Temp\1ce17200496c6ffbbfe6220fa147f7599edce5a4dfb27a0afe14e072ceca5eb6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4128

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4128-130-0x00000000019B0000-0x0000000001CFA000-memory.dmp
    Filesize

    3.3MB