Analysis

  • max time kernel
    90s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    19-06-2022 19:53

General

  • Target

    34d449fac0dd6322d398311f814a16d0b1c00fe570c6665fd5ae8ba728447848.exe

  • Size

    105KB

  • MD5

    5d26682ad1fb8eb184f14ea4bb2f621c

  • SHA1

    9aebf7b1ce0780fc29dcf38e4af757ac79d4b679

  • SHA256

    34d449fac0dd6322d398311f814a16d0b1c00fe570c6665fd5ae8ba728447848

  • SHA512

    26ec807e27e1dceb4d86f8f2961121f295bd07bde6d489ac08cfdb068a092e0864634ec3cb5366ec0e8a4dbbe70753ccefcd18b3f7dab2a1bec6a80de5097e75

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34d449fac0dd6322d398311f814a16d0b1c00fe570c6665fd5ae8ba728447848.exe
    "C:\Users\Admin\AppData\Local\Temp\34d449fac0dd6322d398311f814a16d0b1c00fe570c6665fd5ae8ba728447848.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1416-130-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1416-131-0x0000000000880000-0x00000000008B6000-memory.dmp

    Filesize

    216KB

  • memory/1416-132-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1416-133-0x0000000000880000-0x00000000008B6000-memory.dmp

    Filesize

    216KB