Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 01:56

General

  • Target

    238e1a85738864d59179bb478205f995.exe

  • Size

    203KB

  • MD5

    238e1a85738864d59179bb478205f995

  • SHA1

    5dd4d602d06cb8a8c41bdb4fd0331496272cf7bf

  • SHA256

    82907cc6da07046f7814393d471aa8ab5eebb72b5de1c574d7b7032ffd3e4867

  • SHA512

    cc38f9634787c061b1a7afc72e35f5bcd65f0a7969346f0b0fca9b8dadfdbb5cbcc2582de7f7bff59bfac62409ca00a4215cce8da1159e8a744d535dedc4ca5d

  • SSDEEP

    6144:WFbxKooUWc8lvsTqzKJKTjxlID9XAxp3TCCk:EqDc8lvsTiKEJlIDReIf

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\238e1a85738864d59179bb478205f995.exe
    "C:\Users\Admin\AppData\Local\Temp\238e1a85738864d59179bb478205f995.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3132

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3132-0-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/3132-1-0x0000000000750000-0x0000000000752000-memory.dmp

    Filesize

    8KB

  • memory/3132-2-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB

  • memory/3132-3-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/3132-5-0x0000000000750000-0x0000000000752000-memory.dmp

    Filesize

    8KB

  • memory/3132-6-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB