Analysis
-
max time kernel
66s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 03:46
Behavioral task
behavioral1
Sample
abf48e28c0d1971c12e4b9009c8395245a976b0421af5bdb156dac5e5964de75.exe
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
abf48e28c0d1971c12e4b9009c8395245a976b0421af5bdb156dac5e5964de75.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
abf48e28c0d1971c12e4b9009c8395245a976b0421af5bdb156dac5e5964de75.exe
-
Size
57KB
-
MD5
502c7fefbe341dfb09b19b0f625fcce4
-
SHA1
2871e2ef312e593a467fba7687af9a0a25b12f92
-
SHA256
abf48e28c0d1971c12e4b9009c8395245a976b0421af5bdb156dac5e5964de75
-
SHA512
5130e2e3fde3c504c26db83d25775fe50e096f66d6efc0031a7ff9870f15d1a5d69071e58c2e04bea33751625632f7c88e2d2f3d909c90a45db40de030b1b90d
-
SSDEEP
1536:f8lG70IEzKnBNa6NUcfD9/zDi3C39xCkD:CgEGBNaWnDdayV
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/940-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/940-60-0x0000000000400000-0x0000000000429000-memory.dmp upx