Analysis
-
max time kernel
168s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 14:11
Behavioral task
behavioral1
Sample
1512-62-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1512-62-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1512-62-0x0000000000400000-0x000000000042C000-memory.exe
-
Size
176KB
-
MD5
76976385be1d3ea8042ace18a61be08d
-
SHA1
ed3fb6f548c521d3d8ac40889c21995cacd32066
-
SHA256
2562137669f6c512150530c30a36cc1f080b4ae04c13fc1287daefe975992603
-
SHA512
40f459ff6b62cdfa81dbde3a6b8e0059b8b10cccb3d147ad8b4ff162c82157946892841cc2b2958a81218df9bf6b331c84524a2a58efa1c9aa8c330ee33e26fb
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1512-62-0x0000000000400000-0x000000000042C000-memory.exepid process 2980 1512-62-0x0000000000400000-0x000000000042C000-memory.exe 2980 1512-62-0x0000000000400000-0x000000000042C000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2980-130-0x00000000013A0000-0x00000000016EA000-memory.dmpFilesize
3.3MB