Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2024 14:12

General

  • Target

    2788-14-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    95ee4704a8105d3b382ecad45ca45b8d

  • SHA1

    7db1b1c6ab27a30ed6ecbff99b12e94dfa81a9ec

  • SHA256

    744aaf1c79c65de4e7967a20e84d2d871c194660f3c7ea0948c03717b7092097

  • SHA512

    542ddc95e505d996bb69a6cbc371b627df12e4ebfe6f6ab830a61e1dc77c64d162a75136ea326be99b09715bf0026a2bdea056bae24cb37cad6a311770b25c08

  • SSDEEP

    3072:AMhRFrdZsBClnucXln+Ar5rf87qAGUmcGdo+prMydUgCyB:xfsFsn+S5uqAGUmcGa4VW

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2788-14-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2788-14-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2196-0-0x00000000009A0000-0x0000000000CA3000-memory.dmp

    Filesize

    3.0MB