Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 04:48

General

  • Target

    bdb35d053aab40eb53761b8ba44fe693.exe

  • Size

    44KB

  • MD5

    bdb35d053aab40eb53761b8ba44fe693

  • SHA1

    54b55729455a5b321d3c0d7cc4e7f991a848c47a

  • SHA256

    6573c3f9f9f6969e4a6f61545f1d7aee364ee8104738c26b1896d9a257fa1a32

  • SHA512

    3230cb439dda9cd75c7d76fbb8c0ad066d6ce4c8146b819c4cb9c27ae2c8de31c57b96ef180522c2282f3ac8e0b44be2b200ab78030951fcd6a315b847e10d0c

  • SSDEEP

    384:mJnfo4lN9Bxjg3KIIAT+zetTRbLjprI9bSP52kCVDdymJq19+GowRoEtB+bcuW:mxBNt0NI/zWJuI52bn9YroEtB+bc5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdb35d053aab40eb53761b8ba44fe693.exe
    "C:\Users\Admin\AppData\Local\Temp\bdb35d053aab40eb53761b8ba44fe693.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:368

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads