Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 03:25

General

  • Target

    f60a17379ac224f29d70f77008f784cdb7f80b78be389759aa643ffa41954cdc.exe

  • Size

    5.9MB

  • MD5

    68b53134af15befae93f661b76d3a0b8

  • SHA1

    27949f3640844170b127ef2374bd3150beb80f5e

  • SHA256

    f60a17379ac224f29d70f77008f784cdb7f80b78be389759aa643ffa41954cdc

  • SHA512

    2bbae3b022e8e79ae4d6d2f87eda53de0a60f32f86acc4bd64b4a0dba9515d96f94d6aae5a5077b4adab6faf14469e3880869f9ff0f60700bb7e8f1d247115ca

  • SSDEEP

    98304:qfY0KRfUvFh0vio56iJdUohogG6jGqWfh4rYPFwd9G9ePiGQtlAAjouU:mKhtfkohogGVq3mFROiGQfAAjox

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f60a17379ac224f29d70f77008f784cdb7f80b78be389759aa643ffa41954cdc.exe
    "C:\Users\Admin\AppData\Local\Temp\f60a17379ac224f29d70f77008f784cdb7f80b78be389759aa643ffa41954cdc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1252

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1252-3-0x00000000010B0000-0x00000000016AA000-memory.dmp

    Filesize

    6.0MB

  • memory/1252-4-0x00000000010B0000-0x00000000016AA000-memory.dmp

    Filesize

    6.0MB