Analysis

  • max time kernel
    42s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 23:46

General

  • Target

    137a0cc0b96c892a67c634aef128b7a97e5ce443d572d3631e8fa43d772144c4.exe

  • Size

    10.5MB

  • MD5

    eeca73c6e086be232caa264d7cd2a3f5

  • SHA1

    084345fade7e86f4a2990fcd5dead2fdd3eb5fd6

  • SHA256

    137a0cc0b96c892a67c634aef128b7a97e5ce443d572d3631e8fa43d772144c4

  • SHA512

    ed4a1e27d60df50dbc7e6bc9c58bb7121121811b6a9da54426340faba725c1a2f575e8b6f217d9954ebf263b77560f815f8ef621e8b103f66b82e03f353823cc

  • SSDEEP

    98304:e/Eta3/4miw3UF6y/UG6e2ImL+88qGoFWETM2IfgagB674:e/EA3/4mL3UF6y/UG666+8PomdsgB6s

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\137a0cc0b96c892a67c634aef128b7a97e5ce443d572d3631e8fa43d772144c4.exe
    "C:\Users\Admin\AppData\Local\Temp\137a0cc0b96c892a67c634aef128b7a97e5ce443d572d3631e8fa43d772144c4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads