Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 20:42

General

  • Target

    1c0ec356c01cc43a9fb2b82428dac1b7.exe

  • Size

    24KB

  • MD5

    1c0ec356c01cc43a9fb2b82428dac1b7

  • SHA1

    795096b381b6b130d07fdeb237ab2d52100057fc

  • SHA256

    a9ddc11e49750388faefc5a872048d9f3f17e45b3e1d4cab5425cf47d2c7d51a

  • SHA512

    76789d646d177c2e7d123116044ef4d2775184cade76d4826204eebd93c5ca2a3581cdbc23b8a9507e358f1682814e9573f535e76e25262bfe19bd50ea71da8d

  • SSDEEP

    192:4Y6OSjaG26rAxOpzA/XskDFyFNTZtn9zHJ5T+nsbM61oyacMSszV:4Y6Og2I5zA/nDFcvx+nX61Q5S8V

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c0ec356c01cc43a9fb2b82428dac1b7.exe
    "C:\Users\Admin\AppData\Local\Temp\1c0ec356c01cc43a9fb2b82428dac1b7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads