Analysis

  • max time kernel
    175s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 12:02

General

  • Target

    1cc404bfb1e4e93fb6a1216d6670e878.exe

  • Size

    196KB

  • MD5

    1cc404bfb1e4e93fb6a1216d6670e878

  • SHA1

    ab1c017b3f75ce13e47e3f53fa9e705609ee0cf0

  • SHA256

    1198737172b45566f1507a4a96810e9a4c7d5ca6ff27d911272db054a196823a

  • SHA512

    d0c76c6f0cda19125f5a20e1c58b3dd6cb2bdeca558b416c683359728be20b56e3b57457e675aa286a575c87e5e65c6fe2c08f4302aeb99c18dcd3be57575121

  • SSDEEP

    3072:HvF/dksBFutwBnL5XZ58Ylf6+2NzcJaQOMpJq7JFMmxgwo:HvF/dk2hlXZ58YlfmiEMm1xvo

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cc404bfb1e4e93fb6a1216d6670e878.exe
    "C:\Users\Admin\AppData\Local\Temp\1cc404bfb1e4e93fb6a1216d6670e878.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:5040

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads