Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 02:20

General

  • Target

    6f8c628057278a248d5cc3035024e06bff45b8f5.exe

  • Size

    810KB

  • MD5

    d547a0a1d638e03d49417199cbcd01e5

  • SHA1

    6f8c628057278a248d5cc3035024e06bff45b8f5

  • SHA256

    19045b3560cd864e1dcd0365ee8b664c992c5716c3755e0f7c44d0e36dbd092d

  • SHA512

    3e4c9dda695188bb2920d4b06c345f46251855af78e9af7c26d9c57d7f29211d7cc5834f91e117d0d11cb6fd441ed60adeccc386ee0200d7fd3ed1fc9a5a417b

  • SSDEEP

    24576:r+jbbIcfSaE4hXqDEuwBr4udYW0LOW0LOK:MHIcbE4h6DZwBrTGWqOWqOK

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f8c628057278a248d5cc3035024e06bff45b8f5.exe
    "C:\Users\Admin\AppData\Local\Temp\6f8c628057278a248d5cc3035024e06bff45b8f5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads