Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 09:45

General

  • Target

    1768-66-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    a0fc2eaf7b161873c1ff105f5947ebb1

  • SHA1

    829daa3defe9efc76681194be659c9f7b30ea3c1

  • SHA256

    356f5d5404660b15dfb3b97007c9783f247d27bce6ee8b32ad06a7bd1791ccdc

  • SHA512

    d087ef96a8d0cd55b0d1f92f9d9e82ca9034b88b3365cfec037a4392cdef53161c041ff984d6db1cdd839c1885dccfde5bba2e7a6b0fb920b03194383117007b

  • SSDEEP

    3072:yamjkv98MDV9I30sG6f7lu4KMAaOqEQBm2vEVZNuMdlE/9/:D/G0PS7g4KMArrWm2vEVZrdlQd

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1768-66-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1768-66-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3424-0-0x00000000017C0000-0x0000000001B0A000-memory.dmp

    Filesize

    3.3MB