Analysis

  • max time kernel
    187s
  • max time network
    297s
  • platform
    windows10-1703_x64
  • resource
    win10-20231025-en
  • resource tags

    arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 05:08

General

  • Target

    ab636afce7424bcbdc93485835088b2594011df6a55346cde38fb6d3423eb820.exe

  • Size

    9.7MB

  • MD5

    58d28558b5e2ffbb0238ed852b0fccf4

  • SHA1

    88ce8d1c7a152d5b1095d0ace8815c597111454e

  • SHA256

    ab636afce7424bcbdc93485835088b2594011df6a55346cde38fb6d3423eb820

  • SHA512

    4607a9b40e0878bc06e5bc3c925e434b31ff3d70fa3257555b3a44b51bb011cd6e6aef9eae61cc472c33b3593a54f784c999ef8df71e452ae666b85d3e57b72b

  • SSDEEP

    196608:or04S46+BHT0Bwl7GGlCfYB+w+Ug1LzKlH8lHwqa:JjMTywlCGUYB+w+z6lua

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab636afce7424bcbdc93485835088b2594011df6a55346cde38fb6d3423eb820.exe
    "C:\Users\Admin\AppData\Local\Temp\ab636afce7424bcbdc93485835088b2594011df6a55346cde38fb6d3423eb820.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4192

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4192-0-0x0000000000A50000-0x00000000012DE000-memory.dmp

          Filesize

          8.6MB

        • memory/4192-1-0x0000000073630000-0x00000000737AB000-memory.dmp

          Filesize

          1.5MB