Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2024 19:24

General

  • Target

    4f02ad67d27cf51523957b37569ea993.exe

  • Size

    335KB

  • MD5

    4f02ad67d27cf51523957b37569ea993

  • SHA1

    221e77dca44e6a00159b4f4c202632da2cca9c57

  • SHA256

    74de00f02ccb660aeaddf159cca2ead1d58da78ae405400eeaca7cc5dc42d36f

  • SHA512

    00656f583f3c6dec79ccb4b856189b6d3875894a4b89a6a95dd870d59dced7a852a140da812ce84d5564a01f51e0b87c25951fd43a489847ec2de6bf06a016da

  • SSDEEP

    6144:F03YoadFKf97hFJV9odCsNza25aaSjwUSR5jOMDcSm1:F0sKnodCsNraaSjwUcOMDcn1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f02ad67d27cf51523957b37569ea993.exe
    "C:\Users\Admin\AppData\Local\Temp\4f02ad67d27cf51523957b37569ea993.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1916-0-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1916-1-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB