Analysis
-
max time kernel
145s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:04
Behavioral task
behavioral1
Sample
1a15596b2b2390ad60671595d2f4ec15f23994c10bade4201553b87d732b6c69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a15596b2b2390ad60671595d2f4ec15f23994c10bade4201553b87d732b6c69.exe
Resource
win10v2004-20221111-en
General
-
Target
1a15596b2b2390ad60671595d2f4ec15f23994c10bade4201553b87d732b6c69.exe
-
Size
199KB
-
MD5
360b50ac101c4b9adf919eda6d59bb73
-
SHA1
9f55267536dfcfe1f36bb4ac944f0f76423187fa
-
SHA256
1a15596b2b2390ad60671595d2f4ec15f23994c10bade4201553b87d732b6c69
-
SHA512
36ecdebd729421732b715ed98785fb616557400405a7ad9d3b4eb2adc75914ee8d7d1319e1588618a6804faa6d9cc6a8a602ebea72496fde22c8d6e0735e5fb3
-
SSDEEP
3072:wZ9I46QXMmAIX1tanUKmp3cI87llDpetmfNZBImR6F0neEDYjcJgt2TRKJ:aI4HMKF68KHDSi6CXDnkCR
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4368-132-0x0000000000400000-0x000000000045A000-memory.dmp upx