Analysis

  • max time kernel
    137s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 23:58

General

  • Target

    6fde690b06de85a399df02b89b87f0b808fde83c753cda4d11affded4dca46d7.exe

  • Size

    10.3MB

  • MD5

    bc1f95d4975e7a9c47f4a6c420579edf

  • SHA1

    b97241f2013bcb4bb8a5a73717e7be041d73ff4c

  • SHA256

    6fde690b06de85a399df02b89b87f0b808fde83c753cda4d11affded4dca46d7

  • SHA512

    20ac61b004936ef05303d3a1976b9ad62e546a7800e38899deae20fdb987a838f3a20814fd861be71922db4cd5ee87d4cabe1d6299a9dab34e51fea5ca173e1d

  • SSDEEP

    98304:afT3wneaIQyktAnNeTzFtoWI3ieXAhmEIBYZWLro+E:GySkAOXtZeXEUYZaro7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fde690b06de85a399df02b89b87f0b808fde83c753cda4d11affded4dca46d7.exe
    "C:\Users\Admin\AppData\Local\Temp\6fde690b06de85a399df02b89b87f0b808fde83c753cda4d11affded4dca46d7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4792

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads