Analysis

  • max time kernel
    56s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 05:29

General

  • Target

    f3bc0aabd3ffd26912977ae43d90b5ee187da63436b4395489f75a13012e7dda.exe

  • Size

    181KB

  • MD5

    73a18d1698b2f97ac50770986326e2e7

  • SHA1

    4dff3f670c0e3d35f6e1b492221452ce379d12c9

  • SHA256

    f3bc0aabd3ffd26912977ae43d90b5ee187da63436b4395489f75a13012e7dda

  • SHA512

    a3e09925482d32085885ab1075b5ef9f7f05e089dfd4c402409627fe7b05bae7cf4642500c46fa57bffbdbf48c6b2258173ee1018ab3d622b592729a66a2fe80

  • SSDEEP

    3072:obX4kQvFJdO43t/c5scFV6hP/zSJRVUweMoeks3jG1ZlRRR:vU2tk5B6hP/MV9e3eHzG1Z

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3bc0aabd3ffd26912977ae43d90b5ee187da63436b4395489f75a13012e7dda.exe
    "C:\Users\Admin\AppData\Local\Temp\f3bc0aabd3ffd26912977ae43d90b5ee187da63436b4395489f75a13012e7dda.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4900-133-0x00000000017B0000-0x0000000001AFA000-memory.dmp

    Filesize

    3.3MB