Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 02:27
Behavioral task
behavioral1
Sample
1492-59-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20220715-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1492-59-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20220721-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
1492-59-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
3e42fb22b7ec74356e80c3f4a3f33122
-
SHA1
5292d054904b7b7e57a0b63f5ff1d562a92eb990
-
SHA256
a0a65129c7e9e35be48a4edacfbaeb6585f5126bc777f88bb7d66880e056bed3
-
SHA512
c4ec89ed640d0de0b0d4ffa845f71bd6a8a7e68e85ea777d6c153dac105327ac5fe975af435406511d67823b6f48082b0e195fa085de04cac69b73f119ac1d35
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1492-59-0x0000000000400000-0x000000000042F000-memory.exepid process 1988 1492-59-0x0000000000400000-0x000000000042F000-memory.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1988-54-0x0000000000720000-0x0000000000A23000-memory.dmpFilesize
3.0MB