Analysis

  • max time kernel
    183s
  • max time network
    255s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/11/2023, 04:51

General

  • Target

    342ff25c05649fb9ba1b103aca9e4bcc14bcc0be3406aa64e26e9a7557988197.exe

  • Size

    9.8MB

  • MD5

    d5181b938aba1dd59f7a52597a69a490

  • SHA1

    ef75310b339c5475390ce10a4c5a6bd4a70578a9

  • SHA256

    342ff25c05649fb9ba1b103aca9e4bcc14bcc0be3406aa64e26e9a7557988197

  • SHA512

    834502d38247bd15f56f11826a7f9971e1ce900bd382c985c6e60658dcc7575085a2c35256a12ab9108c792e6801559a43d172def482282e60a3da82d8394ea0

  • SSDEEP

    196608:a8oIF/chXSyr4Rj+SEu03EnVxlXcC3YparCYxFvIt9:zyXprq+faPXpJvY9

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\342ff25c05649fb9ba1b103aca9e4bcc14bcc0be3406aa64e26e9a7557988197.exe
    "C:\Users\Admin\AppData\Local\Temp\342ff25c05649fb9ba1b103aca9e4bcc14bcc0be3406aa64e26e9a7557988197.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4340-9-0x0000024990600000-0x0000024990608000-memory.dmp

    Filesize

    32KB

  • memory/4340-10-0x00007FF97E280000-0x00007FF97E3EA000-memory.dmp

    Filesize

    1.4MB