Analysis
-
max time kernel
119s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 17:26
Behavioral task
behavioral1
Sample
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e.exe
-
Size
194KB
-
MD5
08798c5603d198935ebfb93bea35ae4c
-
SHA1
2a13d8c9d39553a55c5e2e264752285f302110a0
-
SHA256
61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e
-
SHA512
e13d6b2b9040c3afbbbecccffa0879e36a68e5c5f857427e827de66c9c8ff90173821e3f91c8782e0b67001fe170b355e9cfa8dd69cbb1093ed3739836be70db
-
SSDEEP
6144:6yhj148ZJSoUzR5nReX3a0Kgb8OOZvatg+TCUR73JVg5gR+FoZ:6yFxsHnRea05Dw5URE5gUoZ
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2580-132-0x0000000001000000-0x000000000106F000-memory.dmp upx behavioral2/memory/2580-133-0x0000000001000000-0x000000000106F000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\setupact.log 61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e.exe File opened for modification C:\Windows\setuperr.log 61d7927a2402ddd310df920342f136819f3f65f253b8bdcdc41633272490020e.exe