Analysis

  • max time kernel
    91s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-06-2022 05:33

General

  • Target

    2258ee6128cfbc9d7eda381f90438177dbd3ce5104541c49277912f917ed799a.exe

  • Size

    594KB

  • MD5

    84b16e8156520953d4f5f47e732b4962

  • SHA1

    f9dc0f5a13514db107bc28577b447698ba10a565

  • SHA256

    2258ee6128cfbc9d7eda381f90438177dbd3ce5104541c49277912f917ed799a

  • SHA512

    e213b3d03e296c5d801f28e4bed287f104d251ff1a86232b35b3d6625d9eed4495088cddd43d7f448eee49fb50119d0f27491dfd1482d42218c5233692336b41

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2258ee6128cfbc9d7eda381f90438177dbd3ce5104541c49277912f917ed799a.exe
    "C:\Users\Admin\AppData\Local\Temp\2258ee6128cfbc9d7eda381f90438177dbd3ce5104541c49277912f917ed799a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:5004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5004-130-0x0000000000400000-0x000000000049C000-memory.dmp
    Filesize

    624KB