Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-07-2022 18:49
Static task
static1
Behavioral task
behavioral1
Sample
52edad347e8a482f7202b254cd2febe7.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
52edad347e8a482f7202b254cd2febe7.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
52edad347e8a482f7202b254cd2febe7.exe
-
Size
963KB
-
MD5
52edad347e8a482f7202b254cd2febe7
-
SHA1
392bf5d19a859818b1733bc1a9a5bcc20a95cb54
-
SHA256
25ba82ddb901f475074692ca093b706426fc48279bfa15084f4094b6cded4f75
-
SHA512
60295d69ef3915602e00c0dc9f94bad45603f74a137a9aad58e59e12d97f924e248ec08443145e8bdc81a3a5fe4629cc8296a35f1dca84eda9f6c80927a6554a
Score
1/10
Malware Config
Signatures
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1744-54-0x000007FEFC021000-0x000007FEFC023000-memory.dmpFilesize
8KB