Analysis

  • max time kernel
    150s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 11:31

General

  • Target

    1730f8cd1e3047bdba9426322e0fad65.exe

  • Size

    18KB

  • MD5

    1730f8cd1e3047bdba9426322e0fad65

  • SHA1

    3e5b46e83d7907b4b701450510a91ab12c0c170c

  • SHA256

    608ff7f5f5d9b6fb78f95ee2a2fbe75815472b97419847a5d00de1ed8dcf92be

  • SHA512

    7cb80a301313ec9a54e30d6f47512aa75362af17d5e4f7e02024542e68e2de56bd0884cee6221638d7429b9b9f16bba1bf699282425c86956391f8b32211f7a8

  • SSDEEP

    192:nz4M1MVaJIrUxvs2OgMoY0wRl7GezVq5IqpZNsmvbGotyOH+W9kulzcwCSdWjjJs:zcnrgsPvyezVeNyCkulzl4l9mlwBnnC

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1730f8cd1e3047bdba9426322e0fad65.exe
    "C:\Users\Admin\AppData\Local\Temp\1730f8cd1e3047bdba9426322e0fad65.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3780

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3780-0-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB