Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:07

General

  • Target

    18078469e104dcabdbe1f4e361f5b7f7.exe

  • Size

    32KB

  • MD5

    18078469e104dcabdbe1f4e361f5b7f7

  • SHA1

    08eef3f3ce374f26821627bbd1c27ad729ecab19

  • SHA256

    f874072d9fb0802d72ae1b5d9ce35efd9cdf7aea8ec49ce247e845161d9ad34c

  • SHA512

    69dfa589547f36343fa7131b84794e5fa757baa1fb6d7f21cfd8e6cc877c64d64f0d37bef6742d02fc486cee1133d4647ac757ef2f5258916968e86b0b602d49

  • SSDEEP

    384:kbHHBcGQcz3v47NWTDTSFlZJ/bvmlQ/EKJVhW2Kf+eyMBkqwRhEtp+Flhc:kWGQczsNUDTC7NJVhiBy9hEtp+XG

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18078469e104dcabdbe1f4e361f5b7f7.exe
    "C:\Users\Admin\AppData\Local\Temp\18078469e104dcabdbe1f4e361f5b7f7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:5056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads