Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 10:37

General

  • Target

    7a03414891d1f208e2fa4eb9e43b0e96.exe

  • Size

    43KB

  • MD5

    7a03414891d1f208e2fa4eb9e43b0e96

  • SHA1

    b871d4d779ae6d864f3d089b7a7be50102767cca

  • SHA256

    5912924e675f2a9d0da4ae10927680eafccd1f3b5282d5a77d87c0b10d775173

  • SHA512

    1f2bcf2b4c12bc42014d0e7e3d9d6597bba93f5444fa257788aaa85f9d89f51ebb9664c4338882f4e2a4297dff84aec1e52b973fedd3f5e47dee6e79d881af13

  • SSDEEP

    768:nFg+33Krg/18qlva+EHsQyDGDPjBkOErViLbbLP:nF7JdW+EMrOE0TLP

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a03414891d1f208e2fa4eb9e43b0e96.exe
    "C:\Users\Admin\AppData\Local\Temp\7a03414891d1f208e2fa4eb9e43b0e96.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1300

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1300-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1300-1-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1300-2-0x0000000000570000-0x0000000000575000-memory.dmp

          Filesize

          20KB

        • memory/1300-3-0x0000000000570000-0x0000000000575000-memory.dmp

          Filesize

          20KB

        • memory/1300-4-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1300-5-0x0000000000570000-0x0000000000575000-memory.dmp

          Filesize

          20KB