Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2023 01:57

General

  • Target

    c21780bbce51e887ead9136cbe9bf5988c58464863144ab83035a1c2b5828387.exe

  • Size

    672KB

  • MD5

    9ab9bb50d51e41faa3701c170847482c

  • SHA1

    73b2784d96cf29c53bb13ba6e3a9e0d7660d6fad

  • SHA256

    c21780bbce51e887ead9136cbe9bf5988c58464863144ab83035a1c2b5828387

  • SHA512

    5d78f7b3f55a0a2bec1c279a7f75474ece0ac597a372052ef4ccb8b1bcf1d742d17fa85f776da7446e282cc1e27569b3483098c949a28860b8fe6ed1b7d51ceb

  • SSDEEP

    12288:pWlx4HF04aNmCnhdPBSv2ZoEvzC5Q2RqJ45PpBHN9XTKlN+6Sl0o3K5qmnHR:pSx4PQPBSe/G3W49DrXel86SVaJH

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c21780bbce51e887ead9136cbe9bf5988c58464863144ab83035a1c2b5828387.exe
    "C:\Users\Admin\AppData\Local\Temp\c21780bbce51e887ead9136cbe9bf5988c58464863144ab83035a1c2b5828387.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3444-0-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/3444-3-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/3444-2-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/3444-1-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/3444-4-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/3444-5-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-8-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-7-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-6-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-9-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-10-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-11-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-12-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-13-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-14-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-15-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-16-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-17-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-18-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3444-19-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB