Analysis
-
max time kernel
13s -
max time network
104s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 07:01
Static task
static1
Behavioral task
behavioral1
Sample
35946b4b5cb1223155017c5e34962fff9644c6a04f1cb23628a749bb313e5d07.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
35946b4b5cb1223155017c5e34962fff9644c6a04f1cb23628a749bb313e5d07.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
35946b4b5cb1223155017c5e34962fff9644c6a04f1cb23628a749bb313e5d07.exe
-
Size
4.6MB
-
MD5
04dc66671c4c71241efabb518c2374b1
-
SHA1
fa23b72be3f29ee350c08093eaeeaf39caded74f
-
SHA256
35946b4b5cb1223155017c5e34962fff9644c6a04f1cb23628a749bb313e5d07
-
SHA512
66cb6e2d446ca24d01073e989b61894d920e8815fb0b6097927d19306a8a0ca629e61e79fc33b0ebff05fb511a5be542176484c9a582ffd53e752e65693af029
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4760-0-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral2/memory/4760-1-0x0000000000400000-0x00000000010B6000-memory.dmp upx