Analysis

  • max time kernel
    92s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 21:59

General

  • Target

    8d73b0b11ff5a243199a5773a01b4c2b.exe

  • Size

    186KB

  • MD5

    8d73b0b11ff5a243199a5773a01b4c2b

  • SHA1

    ffa40d881d2f3add52ac582d16a6b601ca57084d

  • SHA256

    15e7065450885028550b169cc3b8d973977b57bee8a3e201f09a4e52bc812c75

  • SHA512

    63648422e17d6608f97e5c5d0a832a78681912a98361a08ca709a83a6658b30f73af8072f339cbd56558a145b23f498d024a82e2002b8100ce73da85ea4d7f13

  • SSDEEP

    3072:usaHDDNo6/c0Xg0L/rZPFBpMNjypLb7Ot2MfcJaQOMpJq71qSDJwq:usaHDDR00Xg0bDojypLb7yWEMFQCq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d73b0b11ff5a243199a5773a01b4c2b.exe
    "C:\Users\Admin\AppData\Local\Temp\8d73b0b11ff5a243199a5773a01b4c2b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1732

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads