Analysis
-
max time kernel
133s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 21:21
Behavioral task
behavioral1
Sample
0b7209e0c62de52b21765ea229af6483216a440afe2865e59b517a150b67ec15.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b7209e0c62de52b21765ea229af6483216a440afe2865e59b517a150b67ec15.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
0b7209e0c62de52b21765ea229af6483216a440afe2865e59b517a150b67ec15.exe
-
Size
41KB
-
MD5
4ef6fee12313b6d24cdd26e76703fec0
-
SHA1
21ec781d1bee08d4a815487d838240e5f6dc9b2b
-
SHA256
0b7209e0c62de52b21765ea229af6483216a440afe2865e59b517a150b67ec15
-
SHA512
0583871478f58424bb08334f8b30e3f29c857924640b6756d9fae2f86f8da334c99b34c7335db060e5473dfb6e2402ff48cc0c866d4caca8a2cb80e0f5f12a4a
-
SSDEEP
768:TqVf/UtNvTMinRHd+uX9+ndTjNa2N/setxzG6InBj9aqeiU:T4oNAyRkaEd9a2Fs2lSML
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1788-55-0x0000000000400000-0x000000000042C000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\AppPatch\4.dll 0b7209e0c62de52b21765ea229af6483216a440afe2865e59b517a150b67ec15.exe