Analysis

  • max time kernel
    68s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 23:39

General

  • Target

    189e395afb4efe7bc8e300b644c1b290.exe

  • Size

    1.8MB

  • MD5

    189e395afb4efe7bc8e300b644c1b290

  • SHA1

    eabb53d1508bc5855360b387beb91429eff26f60

  • SHA256

    b1852de0ce746f19baffdcb3a694b3a65a5dc813e2dfc0046da9474401f1ecbb

  • SHA512

    90ae2566ca1b63840c9a088b754c7097e823a4c24ea7436948c2566d052031f7f18d9666e4e150eed2e09b76df14b41c1e6fd1975ee0dd89baca5602c72b0141

  • SSDEEP

    49152:rOf7VkgZ41jwavGHKtNq8zE6AIQwX+LwULebD/M:rOfBx41PvrtNlAchOLIM

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\189e395afb4efe7bc8e300b644c1b290.exe
    "C:\Users\Admin\AppData\Local\Temp\189e395afb4efe7bc8e300b644c1b290.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1096

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1096-54-0x00000000768A1000-0x00000000768A3000-memory.dmp

    Filesize

    8KB

  • memory/1096-55-0x0000000001F80000-0x000000000294C000-memory.dmp

    Filesize

    9.8MB

  • memory/1096-56-0x0000000001F80000-0x000000000294C000-memory.dmp

    Filesize

    9.8MB

  • memory/1096-57-0x0000000002950000-0x0000000002AEE000-memory.dmp

    Filesize

    1.6MB

  • memory/1096-58-0x0000000002950000-0x0000000002AEE000-memory.dmp

    Filesize

    1.6MB

  • memory/1096-59-0x0000000001F80000-0x000000000294C000-memory.dmp

    Filesize

    9.8MB

  • memory/1096-60-0x0000000002950000-0x0000000002AEE000-memory.dmp

    Filesize

    1.6MB