Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 19:58

General

  • Target

    22699d6bcc323a2514d6a409c9f99da3a63bc88efb5797ba2333a6bddda37146.exe

  • Size

    164KB

  • MD5

    0c10d7d85fec172b98181c00bebc9899

  • SHA1

    a66b9d3fad7efc45522b312a63c9cea8578eca67

  • SHA256

    22699d6bcc323a2514d6a409c9f99da3a63bc88efb5797ba2333a6bddda37146

  • SHA512

    7fa017d29058b1392e682d08bf8da26b92bbd4b16963445e6de41f3c16066e6bdb1d4a20465417653347b5e4dab349f2dd61aa058906bc7a04823164641a22f6

  • SSDEEP

    3072:PPp/Z62Fkc/5I29kMntfNc2ktNjcJ+WLBmgBqhmbtbDb8yoEq:P9dbRmMn96VtNjcJ++YnmbpDb83

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22699d6bcc323a2514d6a409c9f99da3a63bc88efb5797ba2333a6bddda37146.exe
    "C:\Users\Admin\AppData\Local\Temp\22699d6bcc323a2514d6a409c9f99da3a63bc88efb5797ba2333a6bddda37146.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:392

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/392-0-0x0000000000810000-0x0000000000B13000-memory.dmp

    Filesize

    3.0MB