Analysis

  • max time kernel
    19s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    11-06-2022 23:21

General

  • Target

    241c852c185d13643fd9a4974f62d30aa5f412688afcb76760665c2505a25f55.exe

  • Size

    164KB

  • MD5

    e33478d6cfd18b5e8f8eb0230ac48f86

  • SHA1

    475982ccdd5d38630ea2d2e7096681505043f2ea

  • SHA256

    241c852c185d13643fd9a4974f62d30aa5f412688afcb76760665c2505a25f55

  • SHA512

    a9776eb65a010b1638581ebf6809d3dfc8f28b8f20ed7c9a3de13edbd440ca4b767bfc4a5fc5120a7ab432cd5757a045a1ec37712784505bf055ee97f48a7368

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\241c852c185d13643fd9a4974f62d30aa5f412688afcb76760665c2505a25f55.exe
    "C:\Users\Admin\AppData\Local\Temp\241c852c185d13643fd9a4974f62d30aa5f412688afcb76760665c2505a25f55.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1700-54-0x0000000076171000-0x0000000076173000-memory.dmp
    Filesize

    8KB

  • memory/1700-56-0x0000000001ED0000-0x0000000001F6F000-memory.dmp
    Filesize

    636KB

  • memory/1700-57-0x00000000022E0000-0x000000000240D000-memory.dmp
    Filesize

    1.2MB

  • memory/1700-58-0x0000000000630000-0x000000000064F000-memory.dmp
    Filesize

    124KB

  • memory/1700-59-0x00000000025D0000-0x00000000026D9000-memory.dmp
    Filesize

    1.0MB

  • memory/1700-60-0x00000000000E0000-0x00000000000EA000-memory.dmp
    Filesize

    40KB

  • memory/1700-61-0x0000000000120000-0x0000000000126000-memory.dmp
    Filesize

    24KB

  • memory/1700-62-0x0000000000120000-0x0000000000126000-memory.dmp
    Filesize

    24KB