Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2023 10:26

General

  • Target

    2012-48-0x0000000002AC0000-0x0000000003AC0000-memory.exe

  • Size

    16.0MB

  • MD5

    059a57af3fffa6afb00b49a49f7b9026

  • SHA1

    b5789888a933a67bf7b2cd14b0d714d8c63aa123

  • SHA256

    dddc899a90cfe2bee23cafd8850b77d8f2bd3cc1dd4eeb49ed5549491ef201f5

  • SHA512

    ce6ff3548aa9653721804c82f5bff5efdcfc8751a03ad4b304a44270eec00ff8cc830d3621ceb55c94b42a84576c1d9087f01a90fcce5c735c2e81f6b460a61e

  • SSDEEP

    6144:tMSAgdGQ+ya6toYmE5LCe8knWOEWrUnl:tWQ+y5egj/HQ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2012-48-0x0000000002AC0000-0x0000000003AC0000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2012-48-0x0000000002AC0000-0x0000000003AC0000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1488

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1488-0-0x00000000014F0000-0x000000000183A000-memory.dmp

    Filesize

    3.3MB