Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 19:29

General

  • Target

    G-808669-268502542.exe

  • Size

    676KB

  • MD5

    3f2b3a7a92e44ec23990ef859911acbd

  • SHA1

    b67007511028ac8fdafcf81897cd35be6464247d

  • SHA256

    e3702f0c7b1110bcbcc56dc2c9bc3d664a5327beecc106749e5ba6bd67e55f26

  • SHA512

    e9452de01c3190d2eb85747f930bebcacbda957612c58452621d1b8beed429039bf39ceca24acf84e10c7f1df59681cf9720b5f05895e519dbacd668dc1b1204

  • SSDEEP

    12288:i3D8/eMp3q+AJlK3Hn8DcmSpOVcEn7e0OEst1/ibkcnX4Yx/:ike3235mSpUc67D0cX4k/

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\G-808669-268502542.exe
    "C:\Users\Admin\AppData\Local\Temp\G-808669-268502542.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1284-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1284-4-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1284-3-0x0000000000401000-0x00000000004A0000-memory.dmp

    Filesize

    636KB

  • memory/1284-2-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/1284-1-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1284-6-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1284-5-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1284-7-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1284-8-0x0000000000401000-0x00000000004A0000-memory.dmp

    Filesize

    636KB