Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:13

General

  • Target

    193463cdb6b20ba198803b1ae33beae998a22bb99e4355b9a7a709d9c3d86304.exe

  • Size

    168KB

  • MD5

    b638340fbf88bef5a2b9593c5e083a4d

  • SHA1

    fe7ff6c329e631c36e95223f86696388a3a942fe

  • SHA256

    193463cdb6b20ba198803b1ae33beae998a22bb99e4355b9a7a709d9c3d86304

  • SHA512

    006e473c2dadf4bc338091c829e3509e35c6d587aa16a4abfa2bf7ad338a4432949a6c6382da6ec4b027aeac3bba0a2c5c9327bef3d0cbbdf80edcc59243c694

  • SSDEEP

    3072:ggp8g2CJKhmYkMKSY+ybdd9Z4BG/fsQ4KFWxapuaqTkp:gDe3FMKp9bddH4BSsQ4Kl

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\193463cdb6b20ba198803b1ae33beae998a22bb99e4355b9a7a709d9c3d86304.exe
    "C:\Users\Admin\AppData\Local\Temp\193463cdb6b20ba198803b1ae33beae998a22bb99e4355b9a7a709d9c3d86304.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2648-0-0x0000000000710000-0x0000000000A13000-memory.dmp

    Filesize

    3.0MB