Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:05
Behavioral task
behavioral1
Sample
4bbde240ca2c7b43ba0b80723a2080d0b91eba3f905466e2ae1e70fca10b50c3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4bbde240ca2c7b43ba0b80723a2080d0b91eba3f905466e2ae1e70fca10b50c3.exe
Resource
win10v2004-20220901-en
General
-
Target
4bbde240ca2c7b43ba0b80723a2080d0b91eba3f905466e2ae1e70fca10b50c3.exe
-
Size
236KB
-
MD5
54109147875e3c8d4cefca2c18338e3e
-
SHA1
86741179191ea0caa54bc193b74b9b86e574814f
-
SHA256
4bbde240ca2c7b43ba0b80723a2080d0b91eba3f905466e2ae1e70fca10b50c3
-
SHA512
f1a406f32c6f7815afae5654874d226c355fc9a89d17d9e613be79bac7f45a7cfa588f70a3669cdb0754c6910b4735c6edd260cd34cd16a5f5b87a1a485edfde
-
SSDEEP
3072:lf57ErtFuxpstUn11TTx4nlurBj6V0dZEJ2Qlz4pwbPl48WntL6yiL9yixN/AeP8:lfgKXXH+nlQy0dq2Q6gPl4dOBpHkDb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2548-132-0x0000000000400000-0x00000000004A7000-memory.dmp upx behavioral2/memory/2548-133-0x0000000000400000-0x00000000004A7000-memory.dmp upx