Analysis

  • max time kernel
    151s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 18:33

General

  • Target

    9dfd25c03840a9ac899ba0b83da802a3.exe

  • Size

    188KB

  • MD5

    9dfd25c03840a9ac899ba0b83da802a3

  • SHA1

    2ac833c5f07c522648a3b12c4762f4ef1d88fc5a

  • SHA256

    0cbf0d1a4fc3daf74db2d42716cabf09656bbfac066e51d13a420a7fc9b8c0c4

  • SHA512

    1d74f95a59c109291c8ddc818f8c9fd329ab1fd2b44ae833961217f82abb428ea5514cf03d0d2f5224c44516610097451305b2fe440f2ad0e00e98f5365b8922

  • SSDEEP

    3072:47hCUtUzRGDUkEujbJ7ccaK8ZPTukybnUVd+MlSuj46JBrW:lzyEuJ7DaK8ZPTukldXl3B

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dfd25c03840a9ac899ba0b83da802a3.exe
    "C:\Users\Admin\AppData\Local\Temp\9dfd25c03840a9ac899ba0b83da802a3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3272

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3272-132-0x0000000000F00000-0x000000000124A000-memory.dmp
    Filesize

    3.3MB