Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2023 09:43

General

  • Target

    1076-82-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    630462007c65efdd958d04e89bad1b94

  • SHA1

    27f2896ecb30fb58ec14a8b4f485f23da687cc01

  • SHA256

    36ebcec7e0c6b4d39526f7d5b1f09a4be61bbbb1a24ebfb69ec41d70c82dec9c

  • SHA512

    0cb552400eae30cf3813b92c0494291b2a88ca7ab3eb0d25957cc995b5f490e0169aa9b1ffa1f887ec244ebb3f82092ed062a1b6ded384d2d1f2f418bfb19ed6

  • SSDEEP

    3072:4hIg39FjjoLA9F874bHeCg5bHEA56e83uCXzzUbP2CPb4Tld1fT0VfN2t+PHM:1YjTRbHpabkw6H3uCjgTRg1AVfU2M

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1076-82-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1076-82-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-54-0x0000000000890000-0x0000000000B93000-memory.dmp
    Filesize

    3.0MB