Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 09:23

General

  • Target

    1404-76-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    576b237e99b219723986eab62ddbadf4

  • SHA1

    1f0ee4fa18bf49ebd72b0f8eaa63f8b7b82b7307

  • SHA256

    9a1ae4b750163646c67bc45d74b945c314379ca81ed9ef6f69be77fb08b9693c

  • SHA512

    eeffb6ce0294df5c77d5de245d24c8fef7bb9fc7072f180cc2fe8d0c0e22cde3a6afb5899b8c1736d3dab5eab37b524c26f16c7d86b6234d8e4d99060f8c09bd

  • SSDEEP

    3072:SFU5kFr/XFUkc1z7vSbc1pVassqbUn5baMeNX2gLZaR3xwyRSjXeb/LC:LuXAHSbYpiqbUn5baMu2Rwy46bjC

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1404-76-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1404-76-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1088

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1088-132-0x0000000001500000-0x000000000184A000-memory.dmp
    Filesize

    3.3MB