Analysis

  • max time kernel
    188s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 20:17

General

  • Target

    8e71a2937add12991a5b18f1a253166ff3e8e40604bcacecadcc46f144bb07ef.exe

  • Size

    89KB

  • MD5

    dc4b4dd75f31887ef5811547d9bc26b3

  • SHA1

    14ba773c83a5a5a43947933929dfcb8e69102d76

  • SHA256

    8e71a2937add12991a5b18f1a253166ff3e8e40604bcacecadcc46f144bb07ef

  • SHA512

    c6ed13b11be430f4ac5b8f7ae1c57dba829d6281ca418886fdef35a0ebf8896c0ef36efd08f44d1d79282b2339706bba4db284cc15e188f4609796bdaea53110

  • SSDEEP

    1536:t9f/7U265kq3gKL2F4UT9888888888888W88888888888Bvh:t9f/7UgrKL2T9888888888888W88888X

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e71a2937add12991a5b18f1a253166ff3e8e40604bcacecadcc46f144bb07ef.exe
    "C:\Users\Admin\AppData\Local\Temp\8e71a2937add12991a5b18f1a253166ff3e8e40604bcacecadcc46f144bb07ef.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3444

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads