Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2023 10:31

General

  • Target

    2868-62-0x0000000000400000-0x0000000000429000-memory.exe

  • Size

    164KB

  • MD5

    4fddfa668cc345a8e6237c1ee3b98815

  • SHA1

    eef5a01c907852955221244ab0fac736d56afac7

  • SHA256

    46ab3f46658240f968a75fedfc96ed4d510404df53ae26300f79c0f7c1076163

  • SHA512

    4103d04e49b3c8766a512643ce8195a4f78b9ae031823b993fe9a8f6e6bbd1d765112f40388ae6ed38674a43e381168cd09c0df24b223c870756d130b3953c34

  • SSDEEP

    3072:QspeY2fikqwsoKMDwDNBit6hFEYtLXq4lyQaZ:QRnz27MDkXit6hFEQq4lyQ0

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2868-62-0x0000000000400000-0x0000000000429000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2868-62-0x0000000000400000-0x0000000000429000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:840

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/840-54-0x0000000000950000-0x0000000000C53000-memory.dmp
    Filesize

    3.0MB