Analysis

  • max time kernel
    170s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 07:02

General

  • Target

    0d5e39b727a273ef6cca8b189393f52d.exe

  • Size

    232KB

  • MD5

    0d5e39b727a273ef6cca8b189393f52d

  • SHA1

    be602f00b4d547aef8c92ce61fba2760149c155a

  • SHA256

    1648b80a14ad9515b9670d278a4c8a43472d4d99b902c11e0eea2ed0dfbad261

  • SHA512

    34c107a5de43b61f36c9f2883f5b229a8f20bc76eec85659fb1ada77e628d9eac084ec89a2dda92632a0ae8b672cb58f436a7034b58926b0e5ecf250e7f9599b

  • SSDEEP

    3072:9df1kEQWtAKXbPd3huonXVZwcJaQOMpJq7OUe+gkw9:9dNkEbrPdn3vEMWe+E9

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d5e39b727a273ef6cca8b189393f52d.exe
    "C:\Users\Admin\AppData\Local\Temp\0d5e39b727a273ef6cca8b189393f52d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads