Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 13:56

General

  • Target

    F-298575-377072069.exe

  • Size

    676KB

  • MD5

    c6cca46a69be508c58c650f20a7deb7d

  • SHA1

    839512536c89ef1a5e93937131a71dd9fbc279fd

  • SHA256

    a3c10a2df6b2b85750df43fc916db58724a27dcbcea3a9697c2b050221881ba8

  • SHA512

    de59401c4b3432f5620f15c2c0e9a7dd62b5348bc641558b3afa196974d0dc7d1777cd2edcfd17345577a0ad08b5058d64c6570fc1050381be7e9847fc098044

  • SSDEEP

    12288:sJOFGCp7gwUZDNFlt/+gBiW0XNP4AGaH0pmOWR3ydNzzUtaVyAq01ZRwD:sOG8UlDltMrOaH09qyzUwRwD

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\F-298575-377072069.exe
    "C:\Users\Admin\AppData\Local\Temp\F-298575-377072069.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-0-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/368-1-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB

  • memory/368-3-0x0000000000401000-0x00000000004A0000-memory.dmp

    Filesize

    636KB

  • memory/368-2-0x0000000000610000-0x0000000000611000-memory.dmp

    Filesize

    4KB

  • memory/368-4-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/368-5-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/368-6-0x0000000000401000-0x00000000004A0000-memory.dmp

    Filesize

    636KB