Analysis

  • max time kernel
    293s
  • max time network
    377s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2022 01:43

General

  • Target

    1544-65-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    a06c9611a87fb58751a15e3c10580ece

  • SHA1

    8d8cce7352ca2f949cd9b57f3a2151412ed3c62c

  • SHA256

    ddb05e44f0d9af34a8ceda956f88020e7cf1c100af8641b1cc9a0fc99d3adb4d

  • SHA512

    f38235afc9c9ad9734dc07b47619434d2465593dc7e2efb2338891c0b9d478cb1ca89ad6ab4850d87cd6389d9e962296e865a12da0b2b2fdf6e24475efe134b1

  • SSDEEP

    3072:+ls2kzV4krLBv73+buRH4KH2mI0rs2zNFTFZGmdnFe5CBqMEA1:VZ5T+y54KH2mIBuFxZt1cjs1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1544-65-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1544-65-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-132-0x0000000000F10000-0x000000000125A000-memory.dmp

    Filesize

    3.3MB