Analysis

  • max time kernel
    365s
  • max time network
    415s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 09:46

General

  • Target

    a24195a3b5cf102408b5b291442ce15ecd0af2363f171e9b1eafe53a7ee962c9.exe

  • Size

    130KB

  • MD5

    5efb09971c901bb80451922067119ebc

  • SHA1

    045b70e80a2efb85cc78d215996d7b531445390a

  • SHA256

    a24195a3b5cf102408b5b291442ce15ecd0af2363f171e9b1eafe53a7ee962c9

  • SHA512

    c31974465ace89b17973d6554b0014ea1f1fa0e63faf2f6910e127d6c49a2086c549c079919d02a290924fb4828345a793ae4cee80827b3aa3ff9ddce3255487

  • SSDEEP

    3072:6S3i7bVEgmv5UP6hcRXuS6S9L3e2ta2OMdjX:6SKVEgmv5UyhvK973aodj

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a24195a3b5cf102408b5b291442ce15ecd0af2363f171e9b1eafe53a7ee962c9.exe
    "C:\Users\Admin\AppData\Local\Temp\a24195a3b5cf102408b5b291442ce15ecd0af2363f171e9b1eafe53a7ee962c9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads