Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-08-2022 22:15
Behavioral task
behavioral1
Sample
d9eaa5384d098d940bb804add7889f165bac873900b8885550e99e637cc7c6fa.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
300 seconds
General
-
Target
d9eaa5384d098d940bb804add7889f165bac873900b8885550e99e637cc7c6fa.exe
-
Size
7.0MB
-
MD5
3d9ebb673b51a07c63fb443971855740
-
SHA1
8d9c2dcd428c9230dfd98ff04af2e4548db5d8ff
-
SHA256
d9eaa5384d098d940bb804add7889f165bac873900b8885550e99e637cc7c6fa
-
SHA512
7c16644529887b135989c87537efe457556cdfc9f1d795fac19377ac63ebff0381a030a638a295691a3059be15aa4bf17c07e5c0b4c5d5e3db9def4b72e484eb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1976-54-0x0000000000400000-0x000000000104E000-memory.dmp themida behavioral1/memory/1976-55-0x0000000000400000-0x000000000104E000-memory.dmp themida -
Processes:
d9eaa5384d098d940bb804add7889f165bac873900b8885550e99e637cc7c6fa.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d9eaa5384d098d940bb804add7889f165bac873900b8885550e99e637cc7c6fa.exe