Analysis
-
max time kernel
0s -
max time network
4s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 09:28
Behavioral task
behavioral1
Sample
253c7680100507ee1690a764802ea5c8818b277e0bcacd87242d755fa8851f90.exe
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
253c7680100507ee1690a764802ea5c8818b277e0bcacd87242d755fa8851f90.exe
Resource
win10v2004-20220901-en
1 signatures
150 seconds
Errors
Reason
platform exec: image=C:\Users\Admin\AppData\Local\Temp\253c7680100507ee1690a764802ea5c8818b277e0bcacd87242d755fa8851f90.exe
command="C:\Users\Admin\AppData\Local\Temp\253c7680100507ee1690a764802ea5c8818b277e0bcacd87242d755fa8851f90.exe"
wdir=C:\Users\Admin\AppData\Local\Temp
Payload error: The %1 application cannot be run in Win32 mode.
General
-
Target
253c7680100507ee1690a764802ea5c8818b277e0bcacd87242d755fa8851f90.exe
-
Size
304KB
-
MD5
220fa448cded1527a1a50ff779809fa0
-
SHA1
0f699a7f6aa394e02e62ff3c744b09b8b744786c
-
SHA256
253c7680100507ee1690a764802ea5c8818b277e0bcacd87242d755fa8851f90
-
SHA512
f358c3a5755aa8eced92b2753dc591360103af833fc2f9283333badffec8915b53d03a3b65ead87b84d6ab79a3aa30cedb9a2e6098c37aeb9a9b0a8bdb4a72aa
-
SSDEEP
6144:8K5Xl3Pa0XgYxbclze4WZb08mZtnCbrK5J6lw+5QirlIJwOMy6:1Xl/VXes4y08mZe25J6a7ias
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1616-132-0x0000000000010000-0x000000000005C200-memory.dmp vmprotect