Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 11:17

General

  • Target

    2df908df3695285c6d835ac914fcbcaaa9f7b53dc2ef60971ef3301b0b2c2e1a.exe

  • Size

    2.4MB

  • MD5

    16158adcf180c16c53f4926e98878ae6

  • SHA1

    2c5e1464567982b647c7ed608d78709577219d48

  • SHA256

    2df908df3695285c6d835ac914fcbcaaa9f7b53dc2ef60971ef3301b0b2c2e1a

  • SHA512

    edb8902e8bf7f3ac98787faff8e0fc7c82c41ad9865b5522e12672b2f0a6febf3a92a7dfcce49f0766aadb16a05d93f72723f43509a15f7815c8edefd3c6b1db

  • SSDEEP

    49152:8VDZKvw4H8LMonNhJ+DkJE6GFVfoPRNJzkBt8:SDEvw4qjj2ENJ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2df908df3695285c6d835ac914fcbcaaa9f7b53dc2ef60971ef3301b0b2c2e1a.exe
    "C:\Users\Admin\AppData\Local\Temp\2df908df3695285c6d835ac914fcbcaaa9f7b53dc2ef60971ef3301b0b2c2e1a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3240

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3240-0-0x0000000077660000-0x0000000077670000-memory.dmp

          Filesize

          64KB

        • memory/3240-2-0x00000000776F2000-0x00000000776F3000-memory.dmp

          Filesize

          4KB

        • memory/3240-1-0x0000000077660000-0x0000000077670000-memory.dmp

          Filesize

          64KB

        • memory/3240-3-0x0000000002EB0000-0x0000000002FAA000-memory.dmp

          Filesize

          1000KB