Analysis

  • max time kernel
    91s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2023 09:53

General

  • Target

    1888-63-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    e11f63e3de985d85c0c51d68e47844d6

  • SHA1

    c1a651fcfdf75791183c801cb4d81075fac9d8f5

  • SHA256

    4771fa9dd239d738b23ec66869560653679930d3b3beef87168655631a528099

  • SHA512

    9ec340bc0cc079660af5393bcafde51b81635cb5967ae988be599f7f8e83b05317d4330eb8a5004af1aad3ec45a2b642c25c98d132444fedb113a62c8f926298

  • SSDEEP

    3072:VxsKECe7s8QoDn3k8Q5sREIKZq6q6G+dg+Sws17imXbd5Z+uwtef:Bc3k5+Kq6q6G+dgis7HAuwc

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1888-63-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1888-63-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3440-132-0x0000000000BA0000-0x0000000000EEA000-memory.dmp
    Filesize

    3.3MB