Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 02:08

General

  • Target

    159b55ed3c0c3c4225310525197ef1075066eb92d15cc54c83d6289d45b65804.exe

  • Size

    21KB

  • MD5

    93f9bad6c256dd6da9d54c988a324e97

  • SHA1

    bca6177c940051485043838d288bb90365d6d791

  • SHA256

    159b55ed3c0c3c4225310525197ef1075066eb92d15cc54c83d6289d45b65804

  • SHA512

    5dac3b80e79174aa095e0b2b717f18fe62e381bf47294760dc5e445f9502103b5a031d0b4bd886aa670d50df51cbde199fe8925e73347c3e7aa421a51374e413

  • SSDEEP

    384:bx02c+NiNMhaS9MySYitL93lppji83C8ARDr3QfTQkNEExIstAv3ATefCiigrcLI:62XiNCR9MLYWi8JsOOstAv3ATec460tX

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\159b55ed3c0c3c4225310525197ef1075066eb92d15cc54c83d6289d45b65804.exe
    "C:\Users\Admin\AppData\Local\Temp\159b55ed3c0c3c4225310525197ef1075066eb92d15cc54c83d6289d45b65804.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/280-54-0x0000000076831000-0x0000000076833000-memory.dmp

    Filesize

    8KB