Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 08:29
Behavioral task
behavioral1
Sample
2ff50d2ee027e2834008b6fb01898954eac3399c9d0b7c526763e0c1597735df.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ff50d2ee027e2834008b6fb01898954eac3399c9d0b7c526763e0c1597735df.exe
Resource
win10v2004-20220901-en
3 signatures
150 seconds
General
-
Target
2ff50d2ee027e2834008b6fb01898954eac3399c9d0b7c526763e0c1597735df.exe
-
Size
99KB
-
MD5
2fca5621eea693eb9ceb70b381f67f62
-
SHA1
ded1183d922912ee3ae6dc3c5f6a0a9ce2bb6151
-
SHA256
2ff50d2ee027e2834008b6fb01898954eac3399c9d0b7c526763e0c1597735df
-
SHA512
c1b215ecc1b0be865dfb0321e91c8c594fb69a0635f1887bce5afd640e77b1984c85788046d4e955720c80b3aa74ec43da8d71b17f449afb6e8f515fc704f3fc
-
SSDEEP
3072:4wi089AvUB1LZPE1AAQvCTjE/j15AY41C:U0wB1LlyVb+15AYF
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1976-54-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1976 2ff50d2ee027e2834008b6fb01898954eac3399c9d0b7c526763e0c1597735df.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1976 2ff50d2ee027e2834008b6fb01898954eac3399c9d0b7c526763e0c1597735df.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ff50d2ee027e2834008b6fb01898954eac3399c9d0b7c526763e0c1597735df.exe"C:\Users\Admin\AppData\Local\Temp\2ff50d2ee027e2834008b6fb01898954eac3399c9d0b7c526763e0c1597735df.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1976