Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    14/06/2024, 22:17

General

  • Target

    astralis.exe

  • Size

    218KB

  • MD5

    e7a7885ba6a7ae7d7aed818c7c0e36de

  • SHA1

    681a5c5d6df0992bd30caa9b45c40cbcdcc0eccf

  • SHA256

    06912f43eaddd7859641fc2241f12efe09e446f716e0c3da44759d822c21ca57

  • SHA512

    891c91e5c64b3eb06714b4739d6d33b48dc01aff5e9b83cfd6b34c89b370750761435e79ee15b178aa16d330972cdbbbe7d8a2eb1fd4bbe9238f72c70839905b

  • SSDEEP

    3072:C41f2Wjv3NcB0cp0AAJbRaWfmVKDGqJA4bumGqE54nmLhjgT5LIcK5fp2:C5AJa4buinp5LIcK5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\astralis.exe
    "C:\Users\Admin\AppData\Local\Temp\astralis.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads