Analysis

  • max time kernel
    161s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 03:37

General

  • Target

    53df878075f1d49acaac9cb620bcac6542020c5015b1473ef4d349aabe58dd06.exe

  • Size

    2.6MB

  • MD5

    a394effc79a67862b4c973ff58b0a888

  • SHA1

    afdd0154030e8f2c091ce93247c903eb243a5f6f

  • SHA256

    53df878075f1d49acaac9cb620bcac6542020c5015b1473ef4d349aabe58dd06

  • SHA512

    f873442d8a937527a9484a1987067ee4d3121dd4edc0ebd2b2112cdf18082c40fdc0fe55a28c3b3d3b33f652adf3e03e39abbe4a874e85ecf0929d1c03f84c86

  • SSDEEP

    49152:d47Nlau3h9JvDrTvEbzTpzw0AKy5Qhc7DwPUtCAs0FpifSXWg:deNlau3PJzqzemsCN0e8

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53df878075f1d49acaac9cb620bcac6542020c5015b1473ef4d349aabe58dd06.exe
    "C:\Users\Admin\AppData\Local\Temp\53df878075f1d49acaac9cb620bcac6542020c5015b1473ef4d349aabe58dd06.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:740

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/740-1-0x0000000073A20000-0x0000000074C74000-memory.dmp

          Filesize

          18.3MB