Analysis

  • max time kernel
    157s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2022 14:36

General

  • Target

    276-66-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    6d607a5253d9c3d35aff504c6e2297e7

  • SHA1

    2c19aa5f76de772213477da43ad138e8bda632d1

  • SHA256

    865e23e9ea26462b990842d9f9db22bf7dbe3daf9767ad9b2fefa34ec74f5a55

  • SHA512

    3e599aeef140b0e8d96c9610cc7d7c5de127bb777fec2641bea0b102f6ec1f02f4dfc530b20c19d4bc1e244605174d53747a999556fca5c1a43306913b676199

  • SSDEEP

    3072:crsoxzTkc1cMvYr3gdBlaqZYUIt1PUJOPgCWUyQNXh/eBTOe:ouDg/gqZYUItvPjWUy4xmBZ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\276-66-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\276-66-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2860-132-0x00000000017F0000-0x0000000001B3A000-memory.dmp
    Filesize

    3.3MB