Analysis Overview
SHA256
4e5bf4122baa8fbd995336c16c08bb32e3bb8e77eef381bda4cd87727693c463
Threat Level: No (potentially) malicious behavior was detected
The file 4e5bf4122baa8fbd995336c16c08bb32e3bb8e77eef381bda4cd87727693c463 was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-10-31 22:53
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-10-31 22:53
Reported
2022-10-31 22:56
Platform
win7-20220812-en
Max time kernel
46s
Max time network
48s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\4e5bf4122baa8fbd995336c16c08bb32e3bb8e77eef381bda4cd87727693c463.exe
"C:\Users\Admin\AppData\Local\Temp\4e5bf4122baa8fbd995336c16c08bb32e3bb8e77eef381bda4cd87727693c463.exe"
Network
Files
memory/1764-54-0x0000000000400000-0x000000000047E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-10-31 22:53
Reported
2022-10-31 22:56
Platform
win10v2004-20220812-en
Max time kernel
91s
Max time network
154s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\4e5bf4122baa8fbd995336c16c08bb32e3bb8e77eef381bda4cd87727693c463.exe
"C:\Users\Admin\AppData\Local\Temp\4e5bf4122baa8fbd995336c16c08bb32e3bb8e77eef381bda4cd87727693c463.exe"
Network
| Country | Destination | Domain | Proto |
| US | 93.184.220.29:80 | tcp | |
| JP | 40.79.189.58:443 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 8.247.211.254:80 | tcp | |
| US | 8.247.211.254:80 | tcp |
Files
memory/2168-132-0x0000000000400000-0x000000000047E000-memory.dmp
memory/2168-133-0x0000000000400000-0x000000000047E000-memory.dmp