Analysis

  • max time kernel
    138s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 15:10

General

  • Target

    d325215e0dcf83ff3f53816fe783a926.exe

  • Size

    286KB

  • MD5

    d325215e0dcf83ff3f53816fe783a926

  • SHA1

    4b1f2e04e61bf83612f7c5fd21c3aaa1b486416f

  • SHA256

    0bb741b078ba437cec3370ce530ac9eae90de808f1fb224707dbf228e5900061

  • SHA512

    aae45aa838546700fc5cebf1d8f34a1eee79b0548d5295e2ef7c305d3fc058d7058bcf6194704a904e2b353e84972b8d84e016771eca4e254005d8e0199a87ff

  • SSDEEP

    6144:orJ04Jb7OAvd7k/oxQWMsCGFwjOgpHZGmAOvyFAasfEI:o+Wb7t17k/GQWMsCcngBZGmhaQEI

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d325215e0dcf83ff3f53816fe783a926.exe
    "C:\Users\Admin\AppData\Local\Temp\d325215e0dcf83ff3f53816fe783a926.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:212

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads