Analysis

  • max time kernel
    144s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 21:41

General

  • Target

    3e0eabd8c35d74fbcb89ff20e173a1cc.exe

  • Size

    238KB

  • MD5

    3e0eabd8c35d74fbcb89ff20e173a1cc

  • SHA1

    e22e5e61308fd70f0951d4f11fd78d1d2b29dcfa

  • SHA256

    215fd4da8bf14dc2d971245e2dbfdc30436f5529cfc14aa8d6ff5e886bd3f4f0

  • SHA512

    2a2abcdecc1b7f4c04566a5c311794e29df456bb4b093eaf0a6cccf2b5c71cf477601b6714d9b4119eed9e6ffb1343510b93f10b082182cb011d9fdca411d854

  • SSDEEP

    3072:LCS7ScBDkCp9ied2+MRsbXl3P4BtvIXQAxI+7VThDDVzHcojQdVE5sqU:LdGCp95vYByZaohBHcoP5sqU

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e0eabd8c35d74fbcb89ff20e173a1cc.exe
    "C:\Users\Admin\AppData\Local\Temp\3e0eabd8c35d74fbcb89ff20e173a1cc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads