Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 03:18

General

  • Target

    352-21-0x0000000000400000-0x000000000042A000-memory.exe

  • Size

    168KB

  • MD5

    ea1f87d884f7e1725703253f44421685

  • SHA1

    149fc6aab754a3b0b9aaabc622b551f6535367e0

  • SHA256

    416d47cae8553f65b0a304ad2414f6d6dec0b9dd273ca56c84967b624c7b57e8

  • SHA512

    4f23fc415f33e6f1124494fe464f4031d3c749c1b84c1ed01c0b6c513e1068e22c3de93673067524623f90abf122afa0fab8bde789f49f25af4728d989c7d7b0

  • SSDEEP

    3072:uira2cYeBwABNWkLVU8CmXVgG+g4aLkOpK//u1eURptjvrZKrxUuB/tZyJ:utAeBthU8BXVgzg4aLU+7V6xbB/tZyJ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\352-21-0x0000000000400000-0x000000000042A000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\352-21-0x0000000000400000-0x000000000042A000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:484

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/484-0-0x0000000000A50000-0x0000000000D53000-memory.dmp

    Filesize

    3.0MB