Analysis

  • max time kernel
    33s
  • max time network
    29s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 03:45

Errors

Reason
platform exec: image=C:\Users\Admin\AppData\Local\Temp\1fcb1d3c59d156ac7aa05bc1ceff32c9f9250bddd1d53a4e33562c56107d822f.exe command="C:\Users\Admin\AppData\Local\Temp\1fcb1d3c59d156ac7aa05bc1ceff32c9f9250bddd1d53a4e33562c56107d822f.exe" wdir=C:\Users\Admin\AppData\Local\Temp Payload error: The %1 application cannot be run in Win32 mode.

General

  • Target

    1fcb1d3c59d156ac7aa05bc1ceff32c9f9250bddd1d53a4e33562c56107d822f.exe

  • Size

    42KB

  • MD5

    135ece684d2fad35bb664d4728238770

  • SHA1

    6d1f9ed329943f463d80d94ea6fa23d4acc22512

  • SHA256

    1fcb1d3c59d156ac7aa05bc1ceff32c9f9250bddd1d53a4e33562c56107d822f

  • SHA512

    0bb6046e0cea32ab024ed8d38a5f1584dc722c5d1c71162caf9ce85bbf0e52743118b100ff8fe46a977da9db588bf6b9ed6941c138852a58e81ebd8babf79329

  • SSDEEP

    768:ulUQ4+740940940940940940940Zg81Y4HWv6urha:uShSW4268o

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fcb1d3c59d156ac7aa05bc1ceff32c9f9250bddd1d53a4e33562c56107d822f.exe
    "C:\Users\Admin\AppData\Local\Temp\1fcb1d3c59d156ac7aa05bc1ceff32c9f9250bddd1d53a4e33562c56107d822f.exe"
    1⤵
      PID:3192

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3192-132-0x0000000000010000-0x000000000001AB80-memory.dmp

            Filesize

            42KB