Analysis

  • max time kernel
    91s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    04-07-2022 13:54

General

  • Target

    4588-167-0x0000000010410000-0x000000001043E000-memory.exe

  • Size

    184KB

  • MD5

    52daa3b8d7a00c033c99c6d500472eb3

  • SHA1

    9fd0eccc203d437405bab2296c24a4071c0bf723

  • SHA256

    1729897277ebd5215234eff086fa731a8d92eb424dcd058fdb41faec1daad9cc

  • SHA512

    cc69c112e21200f016e0f9d699cea3e9165ae427c4b1bc08592933608e386c6be2f8104985c8a85f1ae3552c29409fe700f3d1c4a8f053f27a0d29b1d6cd2e0d

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4588-167-0x0000000010410000-0x000000001043E000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\4588-167-0x0000000010410000-0x000000001043E000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2160-130-0x0000000000E00000-0x000000000114A000-memory.dmp
    Filesize

    3.3MB