Analysis

  • max time kernel
    90s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2023 14:31

General

  • Target

    1716-66-0x0000000000400000-0x000000000042C000-memory.exe

  • Size

    176KB

  • MD5

    3f226ea58b8eb6b0ae5f5a99e9c3ad61

  • SHA1

    a8100933b2b5847d0b765d47e76818ef647e4449

  • SHA256

    2633514d620078db73d0dfba48744e236c5739bad68da73d4cf8cfd9d55542b8

  • SHA512

    076ef284cb7504d5e6e95a303fffc29637af11fdfd4cf9c6da43f08282d059dc1e391134de77bcc7efc76b159d1b56ab0dcc516ff17d70337fa305eb81361959

  • SSDEEP

    3072:9TfMHm2AoRXWTJdpTcn39UcX/2EicC67ghQRP:VLWRcdho3ScX/2EicC6khQF

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1716-66-0x0000000000400000-0x000000000042C000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1716-66-0x0000000000400000-0x000000000042C000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4552

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4552-132-0x0000000001210000-0x000000000155A000-memory.dmp
    Filesize

    3.3MB