Analysis

  • max time kernel
    138s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2023, 05:44

General

  • Target

    createdump.exe

  • Size

    59KB

  • MD5

    a48662183f845eca823960033b5b6712

  • SHA1

    3dc603c92829260fecd702c9dd2ae71993a29ff5

  • SHA256

    930f833726f7e77f11d1c4e8b7a6390ed46776d9797f8b8d7c253f1ec7cdc733

  • SHA512

    f4b62f5029e5802141bcfc581b5abda6a380344181ee4e24cd00e4fdc1683f576784b7738714dc3ee358d6c8b7469cda78b30b7d5dc7e028a0f5e4e5266f40c2

  • SSDEEP

    768:1RCaYWXQL4hlZ/IGOa8wNPeKsU3oS2yhZB3ETBTnh+5Fof3Sb9z6+c4v:1RZNlBI/124QiBThBf3Sxz9cE

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\createdump.exe
    "C:\Users\Admin\AppData\Local\Temp\createdump.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads