Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2023 13:33

General

  • Target

    5100-139-0x0000000000400000-0x000000000042C000-memory.exe

  • Size

    176KB

  • MD5

    d047d259d0b37d06a036e6ce13e5618e

  • SHA1

    0dbf0fd146cd325bc2b920b1bc1b402cbfc0256e

  • SHA256

    99cc17242c89efa227c7f0b3905d75da14f9f74fa83b321f633ac2cdae321987

  • SHA512

    32fcccd12d49dc2f5ac762920bd0f35c0095ad16effbd66785840bbc12cac19d34e40928c16ebe40986ae1c05a0e3b6933ac93cf5059049225a852e929d17ba0

  • SSDEEP

    3072:9TfMHm2AoRXWTJdpTcn39UcX/2EicL67ghQRP:VLWRcdho3ScX/2EicL6khQF

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5100-139-0x0000000000400000-0x000000000042C000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\5100-139-0x0000000000400000-0x000000000042C000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1244-54-0x0000000000970000-0x0000000000C73000-memory.dmp
    Filesize

    3.0MB