Analysis

  • max time kernel
    28s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2023 01:59

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    3bf7bbc0f949e65080db6e99d3767e13

  • SHA1

    2b3c06b550d5a2171e40a7edc390c88aa258c422

  • SHA256

    d06bf8cf6f3e3c5869453c9e444d66390f2c2ddec8d8ebe6cec0207a368d31f3

  • SHA512

    d70cdcbe611289c08b2a5787b173f220372d9c43137e96ff18a019c8078c1737f72a8bdfc6cfbf77e7c406196981cc339e47c73b13c43ce85c24b8762d93b87d

  • SSDEEP

    24576:ZW1YrBXOK6QQeh1551JwzQ1Ju5E0UiZTmz8rUPcMcW25SZroejHU1F1AUkd+qEu:Q1khJw8K/Z33Fh8Ku

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1696-54-0x0000000000930000-0x0000000000AD5000-memory.dmp
    Filesize

    1.6MB

  • memory/1696-55-0x0000000075C81000-0x0000000075C83000-memory.dmp
    Filesize

    8KB

  • memory/1696-56-0x0000000000930000-0x0000000000AD5000-memory.dmp
    Filesize

    1.6MB

  • memory/1696-57-0x000000000C6F0000-0x000000000CA04000-memory.dmp
    Filesize

    3.1MB

  • memory/1696-58-0x000000000C5E0000-0x000000000C7A4000-memory.dmp
    Filesize

    1.8MB

  • memory/1696-59-0x0000000000930000-0x0000000000AD5000-memory.dmp
    Filesize

    1.6MB