Analysis
-
max time kernel
69s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-07-2022 13:37
Static task
static1
Behavioral task
behavioral1
Sample
delay.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
delay.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
delay.exe
Resource
android-x64-20220621-en
android_x64
0 signatures
0 seconds
General
-
Target
delay.exe
-
Size
45KB
-
MD5
2aea66a08c4181638bcf63cee307ece6
-
SHA1
99ec8398af6aa4738cf1f877027e37b47e322c66
-
SHA256
a9ba2aa2c919ea208b1009c1b9b433e3ee1e2724ebd78013f224079e4550ef12
-
SHA512
01d698e5fa077c1feceac00726c192b37e6942d27ec76414926233aa70348b4c99b4b13715b9051fd2a61a0b6d1ac75de0499477e86c8f427bb034a7d714d17d
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2912-130-0x0000000000400000-0x0000000000426000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2912-130-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB