Analysis

  • max time kernel
    163s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 19:18

General

  • Target

    f696d44f5f0189cbab498df61e62c88dd127624c60938d2f132580197621f0c4.exe

  • Size

    208KB

  • MD5

    00e60b58ffb110b3d393acd8b922c7e0

  • SHA1

    78400c5cfae00b7bc97926a3b967ace74b806411

  • SHA256

    f696d44f5f0189cbab498df61e62c88dd127624c60938d2f132580197621f0c4

  • SHA512

    90032a7a2cf3b14520d5efd8e20fc06d024e7b5b01a9376ffbd3568995f69b91c237573774bc6a232f30ea33e01733372113ce065240ad6fdaa57be43801cef3

  • SSDEEP

    3072:VlYUaeN4hBoxT3O14cHydiFlqan0pMwmQIN3C9ISE0qJiNlUdp34UZR:Vl474CSgqXKQISzqJBpb

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f696d44f5f0189cbab498df61e62c88dd127624c60938d2f132580197621f0c4.exe
    "C:\Users\Admin\AppData\Local\Temp\f696d44f5f0189cbab498df61e62c88dd127624c60938d2f132580197621f0c4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3188

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3188-132-0x0000000000DA0000-0x0000000000E53000-memory.dmp

          Filesize

          716KB

        • memory/3188-133-0x0000000000DA0000-0x0000000000E53000-memory.dmp

          Filesize

          716KB