Analysis

  • max time kernel
    28s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2023 06:24

General

  • Target

    1892-85-0x0000000000400000-0x0000000001462000-memory.exe

  • Size

    16.4MB

  • MD5

    6ca2a62e6a7fe5794ccce79eae7e43f4

  • SHA1

    ab2e26d54587b71c0f775956053f69f5fe25cbd5

  • SHA256

    a81d3c70b2b13b83fc8a43a735b54861b307d6bdfe2dbef90a16f6c263c423b5

  • SHA512

    e04dbd271cb59bd4aa6302defe52196bb6f36770663f59db82f3902abd645bf39054a3403abfc523b150df8d1d803811834a3f51431a2de4306c5dad7a79ba2b

  • SSDEEP

    3072:Guq3ME5iCv68AG3BkP93ImLqTGAUcZ3OPkxCsId3sAbpiKWCLk:U2wBS9BLqTGAUcZ3RCsy8Ab2b

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1892-85-0x0000000000400000-0x0000000001462000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1892-85-0x0000000000400000-0x0000000001462000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-54-0x0000000000810000-0x0000000000B13000-memory.dmp
    Filesize

    3.0MB