Analysis
-
max time kernel
1s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
79d48a3ed0f3334a06f5d320f065a9ce66a26c38d6449358660a2461c34af7c7.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
79d48a3ed0f3334a06f5d320f065a9ce66a26c38d6449358660a2461c34af7c7.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
79d48a3ed0f3334a06f5d320f065a9ce66a26c38d6449358660a2461c34af7c7.exe
-
Size
332KB
-
MD5
f9a8972e51526c201f2376de26c1cc7a
-
SHA1
71691fdd0db1ac9d62484f49c3deed078d47ceda
-
SHA256
79d48a3ed0f3334a06f5d320f065a9ce66a26c38d6449358660a2461c34af7c7
-
SHA512
471b66003460a34ef5bced228106f64293d2940448541587b0bdb24200df0dcd57ce63fb1d900bfc86a50be8bb5fccad7a352b3c9e80ae9d5c534ca96b8dcdf3
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4176-130-0x0000000000400000-0x00000000047D5000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4176-130-0x0000000000400000-0x00000000047D5000-memory.dmpFilesize
67.8MB
-
memory/4176-131-0x0000000004C70000-0x0000000004CA6000-memory.dmpFilesize
216KB
-
memory/4176-132-0x0000000000400000-0x00000000047D5000-memory.dmpFilesize
67.8MB
-
memory/4176-133-0x0000000004940000-0x0000000004960000-memory.dmpFilesize
128KB