Analysis

  • max time kernel
    153s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 17:14

General

  • Target

    99b2e61d4335af782fa3e8ac186c637a.exe

  • Size

    703KB

  • MD5

    99b2e61d4335af782fa3e8ac186c637a

  • SHA1

    da40737611a02be236a8079f87a13f3529cfbd83

  • SHA256

    1c844979b643b5a7278bcd742058621e6470aacb0f960c1dffc29d8148a99d47

  • SHA512

    8bdf9548b4f9556d07b514d8709ac9ebf75d8fdb9509a019535b211db3edc87dde9bdf1e1d37a9038e7e675921214a1aac29efb25e48816f1e7f7d1da32b6526

  • SSDEEP

    12288:jMHCsbZO6rv3RoRo5JRABxn7PS9BJLBwla0DUHl6yOGO/1It6dYhUtxbVCAY123i:4isA+vR0oaBx7Azka0DUHl6yOGO/1It6

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99b2e61d4335af782fa3e8ac186c637a.exe
    "C:\Users\Admin\AppData\Local\Temp\99b2e61d4335af782fa3e8ac186c637a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4732

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4732-0-0x0000000002450000-0x0000000002451000-memory.dmp

          Filesize

          4KB

        • memory/4732-1-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/4732-2-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/4732-4-0x0000000002450000-0x0000000002451000-memory.dmp

          Filesize

          4KB