Analysis

  • max time kernel
    112s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2022 08:41

General

  • Target

    680-63-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    af7bcd1ffe605e4d42e07f2a1b8f8b96

  • SHA1

    85573aa7d045c1931edab148043b5a640169fcec

  • SHA256

    06aa27329d87f232684d6fe4607c80129616913e107e86a11c3b9e85191d1c72

  • SHA512

    6744f1654550045b3f21404762d003dff81bf5aa2b8dabc7e7f849f9c492994787831a66cb8091cb93dd9e825906c086bb53bdc80c6036f423b1d107471df6f5

  • SSDEEP

    3072:40ZitFxQYFl8a3oKViDB3Ozp9q6tk8b0srEtZopJOrSxC0Fbb:b7yXiDNOz+6tk8bdYtmyr4C0Fbb

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\680-63-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\680-63-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4936-135-0x0000000001610000-0x000000000195A000-memory.dmp

    Filesize

    3.3MB