Analysis

  • max time kernel
    19s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-06-2022 05:21

General

  • Target

    19cd4deb02d2b5abaeed2ea37ed255ddc078c3a054317b7c4c7430ce7526e2a9.exe

  • Size

    179KB

  • MD5

    b471b0c915a5762839b76a5a31e74841

  • SHA1

    650aa1e536e8082479cbf956d38881260c05868b

  • SHA256

    19cd4deb02d2b5abaeed2ea37ed255ddc078c3a054317b7c4c7430ce7526e2a9

  • SHA512

    8e12ff4eca0e638673b15a8c2de9fd696c093316051fb31571f02c2739cf69e6dc3037368e9006371b0c85eba532a7b46cbc402be7e9624866cbbcc2dacf376c

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19cd4deb02d2b5abaeed2ea37ed255ddc078c3a054317b7c4c7430ce7526e2a9.exe
    "C:\Users\Admin\AppData\Local\Temp\19cd4deb02d2b5abaeed2ea37ed255ddc078c3a054317b7c4c7430ce7526e2a9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1304-54-0x0000000076531000-0x0000000076533000-memory.dmp
    Filesize

    8KB

  • memory/1304-56-0x0000000000D90000-0x0000000000E2F000-memory.dmp
    Filesize

    636KB

  • memory/1304-57-0x0000000000E30000-0x0000000000F5D000-memory.dmp
    Filesize

    1.2MB

  • memory/1304-58-0x00000000002A0000-0x00000000002BF000-memory.dmp
    Filesize

    124KB

  • memory/1304-59-0x0000000001270000-0x0000000001379000-memory.dmp
    Filesize

    1.0MB

  • memory/1304-60-0x0000000000080000-0x000000000008A000-memory.dmp
    Filesize

    40KB

  • memory/1304-61-0x0000000000270000-0x0000000000276000-memory.dmp
    Filesize

    24KB

  • memory/1304-62-0x0000000000270000-0x0000000000276000-memory.dmp
    Filesize

    24KB