Analysis

  • max time kernel
    30s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2023, 16:57

General

  • Target

    992-81-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    8fd2a2b33426aadd345b0dfe09a0897d

  • SHA1

    1f207658b29d05c88b446e50f61ff297f7a06125

  • SHA256

    c19fab30c3534677bdabe8e064e07a83fc7fdd7c6995b21d3a5ea4f466e3c632

  • SHA512

    09df57135b16e4796946f9de622efa5f598b70728cde3f3a9ea21654a20d85b4a127fd619832a2593f50b6cf23c030c7557aae9a212d628aa35cc776c36a3d90

  • SSDEEP

    3072:A6/9mXEdkBwBxW3OQ/FoaWp7a8YhHLny7u/FwE+WBGddTdAgjuo7:Au9AO2F9YaVhHeC1rITFP

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\992-81-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\992-81-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1668

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1668-54-0x0000000000970000-0x0000000000C73000-memory.dmp

          Filesize

          3.0MB