Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 11:21

General

  • Target

    df0a001d108d20d6e745248cdf07f889.exe

  • Size

    616KB

  • MD5

    df0a001d108d20d6e745248cdf07f889

  • SHA1

    7a9556b15747af9b037c920f8a99a3ddee65769d

  • SHA256

    e19e578845245e0ad6fc1759fb0d8ca554228a38b60d046d17baa738a1a8801e

  • SHA512

    0585bc8638af436d39a8b580c0d489359ecf34b88954181290912833974f025c6193e50c4ac62c9da21d1b7f6463062cd582f4066a6b41929b6aa606c7e9822e

  • SSDEEP

    12288:A8SrWUHWkL61Dwg/mjYvpsF81njbt4vefkchfVYnoAD7w2qTu5Fq:A8UWUHWkL61Dwg/mjYvpsF81njbt4veq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df0a001d108d20d6e745248cdf07f889.exe
    "C:\Users\Admin\AppData\Local\Temp\df0a001d108d20d6e745248cdf07f889.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4704

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads