Analysis

  • max time kernel
    279s
  • max time network
    291s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 04:37

General

  • Target

    9ba3a2145eeab71f7193365dd6c6ac4b028e8b4cf7e47ac39f455c91f7e754b7.exe

  • Size

    6KB

  • MD5

    a3c3f4d4aadbf231e7a5f7649825e7fe

  • SHA1

    490e478f918bc0cc06ab2686db4f7709236c2d8a

  • SHA256

    9ba3a2145eeab71f7193365dd6c6ac4b028e8b4cf7e47ac39f455c91f7e754b7

  • SHA512

    833a4151fdba6d030e0398333fa47adf5979923d8c8b3e4ec057cdff1c735010580c7520488c5336045dc1781c2602586e87231eda5dbeb5f4609651cac31790

  • SSDEEP

    192:QTF/2dsAT/wsuwxcK4t9CNp1Z/73Oidap:QR/2dzwocDf273fdY

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ba3a2145eeab71f7193365dd6c6ac4b028e8b4cf7e47ac39f455c91f7e754b7.exe
    "C:\Users\Admin\AppData\Local\Temp\9ba3a2145eeab71f7193365dd6c6ac4b028e8b4cf7e47ac39f455c91f7e754b7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1960

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads