Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2022 11:42
Behavioral task
behavioral1
Sample
4472-130-0x0000000000400000-0x00000000007E4000-memory.exe
Resource
win7-20220715-en
2 signatures
150 seconds
General
-
Target
4472-130-0x0000000000400000-0x00000000007E4000-memory.exe
-
Size
3.9MB
-
MD5
d379842fb214233fbff253f31bf41ae1
-
SHA1
88b800cb447b5f875eb5705007af06062b25a52b
-
SHA256
6f57a98b9d978e10fdf2f6d4a198ae30bf2a246423b9e851458f2ee4050f360d
-
SHA512
2cfaf7a9e6021d4908eee470edf1a8c5dbcd5ec0364670c81bc32757e0d97833611856d2672142e04a2171d8fedcd8a191339c9b78ff6c325dbab209f54aaa09
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1956-130-0x0000000000400000-0x00000000007E4000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1956-130-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB