Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    09-06-2022 11:02

General

  • Target

    1720-67-0x0000000000400000-0x000000000042B000-memory.exe

  • Size

    172KB

  • MD5

    82ed67bc81133ca6025a434c93c3d6e1

  • SHA1

    e3d494dbc5bf7859da93b690e7e65a0dc7f274e1

  • SHA256

    133180872d092c388fb0cbac2f9162ddc70236299f1a870b62248f9a21f6457c

  • SHA512

    6afbd3acda8ba864d30b5cd15db543f37da1889cb5aee77a8e3c4df8c5f838a910952cb6df3cc2c0055059229bf4de3188f02afde2399cfb874d4c8babf1789f

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1720-67-0x0000000000400000-0x000000000042B000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1720-67-0x0000000000400000-0x000000000042B000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/756-54-0x00000000008C0000-0x0000000000BC3000-memory.dmp
    Filesize

    3.0MB