Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 13:23

General

  • Target

    6364a6d374a9aa66d5c7bf1608bed19d7147ab9703c99193edf408b85b870126.exe

  • Size

    102KB

  • MD5

    2f182c1e434bb09b3fcdbe292137fde7

  • SHA1

    de31435ee14df1227fa38f93f6e9002fdd554a50

  • SHA256

    6364a6d374a9aa66d5c7bf1608bed19d7147ab9703c99193edf408b85b870126

  • SHA512

    e644c53910f84262028c3b05da585fea018ed3841ce05f76ece6919c777ab74151b74e1a66be929ed87f7da216f408cc772adabb5aab92ad7578961415ec9eb1

  • SSDEEP

    3072:r5CnPVz0JZEUt7fCYtRaBgm6DNDE8UCiWg:K0HFt1tRVNQ8UCiW

Score
1/10

Malware Config

Signatures

  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6364a6d374a9aa66d5c7bf1608bed19d7147ab9703c99193edf408b85b870126.exe
    "C:\Users\Admin\AppData\Local\Temp\6364a6d374a9aa66d5c7bf1608bed19d7147ab9703c99193edf408b85b870126.exe"
    1⤵
    • Suspicious use of UnmapMainImage
    PID:1636

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1636-54-0x00000000762F1000-0x00000000762F3000-memory.dmp

    Filesize

    8KB

  • memory/1636-56-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1636-59-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1636-60-0x0000000000230000-0x000000000026A000-memory.dmp

    Filesize

    232KB

  • memory/1636-61-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1636-62-0x0000000000230000-0x000000000023D000-memory.dmp

    Filesize

    52KB