Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2023 05:19

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    b859b990ea2adae467e0080aacdfabe5

  • SHA1

    7e206519519d72bf49efbc272d70a4785e282808

  • SHA256

    9146cee3d387cb3d665885b95d885734541f281cbb2a4726b6a59df922a83ee7

  • SHA512

    f61c6e20793461f1a2dac2bd77561518a42010537011026ff406fe03fba0c0148244eb6f5f6ffe55d1f07cd5c21f1f8a898c9302720d9513cb5f606d6022a262

  • SSDEEP

    24576:MOYvJhKAX4PP/6E4OZO/1fURAGVaugrgvuy5KR4LzkKGAWO1ObUKdkES/ip:MJuAoPngIO/efaJ0LKAkYg8ES/ip

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1708-54-0x0000000075551000-0x0000000075553000-memory.dmp

    Filesize

    8KB

  • memory/1708-55-0x0000000002620000-0x00000000027C7000-memory.dmp

    Filesize

    1.7MB

  • memory/1708-56-0x000000000DBC0000-0x000000000DEC5000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-57-0x000000000DA60000-0x000000000DC24000-memory.dmp

    Filesize

    1.8MB

  • memory/1708-58-0x0000000002620000-0x00000000027C7000-memory.dmp

    Filesize

    1.7MB