Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 23:53

General

  • Target

    1712-4-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    147474dec7a5702328d4ce3977b6fa6f

  • SHA1

    0be17959a454e71775af10bfee698425ced9d11f

  • SHA256

    cb30d9786ea7f25eca91760469cddf70c75950163d0596110b6b8cc15a189559

  • SHA512

    84dd4d4ac541201c21b1442230fc266d81f4dde7758f13fccb05ce776f51b69bf9aa55d6507c9fb1db43697c46e08e7788715dad3a33c4875332a8721d46bb57

  • SSDEEP

    3072:E7ryVklfnl56/3FrfNQmsF6V2WKC2DwFo88l21+BVbRMJ:KO/F72J6V2WKCmZkgX9MJ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1712-4-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1712-4-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2860-0-0x0000000000940000-0x0000000000C43000-memory.dmp

    Filesize

    3.0MB

  • memory/2860-1-0x0000000000940000-0x0000000000C43000-memory.dmp

    Filesize

    3.0MB