Analysis

  • max time kernel
    163s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:24

General

  • Target

    01a0bab8eccf68e22974c3dcc71caac8.exe

  • Size

    703KB

  • MD5

    01a0bab8eccf68e22974c3dcc71caac8

  • SHA1

    5addcf853697fab1ad8727fcd47e7b5bdc2ad36f

  • SHA256

    79332dafa96a96fcf5b5679f998c253f2fa8af6b33d23d62eb051850a67a9206

  • SHA512

    77cd2028fbd8a79aa244123b02a3ea80b730b4e4fad4909f5b3e9483a4521a750e3ae838be52f666d86e10a0226f3842b15257aa33bb526711fa58e11b1927e8

  • SSDEEP

    12288:jMHCsbZO6rv3RoRo5JRABxn7PS9BJLBwla0DUHl6yOGO/1It6dYhUtxbVCAY1W3t:4isA+vR0oaBx7Azka0DUHl6yOGO/1ItM

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01a0bab8eccf68e22974c3dcc71caac8.exe
    "C:\Users\Admin\AppData\Local\Temp\01a0bab8eccf68e22974c3dcc71caac8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2124

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2124-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2124-18-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2124-20-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB