Analysis
-
max time kernel
181s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:51
Static task
static1
Behavioral task
behavioral1
Sample
5e1a03f38a2e9412f185676a52d8e477bccc1ef80827f5181a9af769d4765bcc.exe
Resource
win7-20221111-en
General
-
Target
5e1a03f38a2e9412f185676a52d8e477bccc1ef80827f5181a9af769d4765bcc.exe
-
Size
364KB
-
MD5
c8e4dc830fe2ce83434b06d4aabc3f31
-
SHA1
7607d0cc6ab3d3f9c7f1b40ea4bae9929c916d8c
-
SHA256
5e1a03f38a2e9412f185676a52d8e477bccc1ef80827f5181a9af769d4765bcc
-
SHA512
7c84b5d06596eaa6db03da8075d058b024d657ac1fe56513c1ca3616c2cd0187a94139441d1a5934f5a7dc2923f29a9fe73857ecec7b1918200ac5a901c3f703
-
SSDEEP
6144:WBOO856a60r+UogID97/IXjBE7SL+MEXxtSbsP6ANP:WBOO3VKID90TBEhx4O6aP
Malware Config
Signatures
-
Dave packer 2 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral1/memory/1120-55-0x00000000002D0000-0x0000000000302000-memory.dmp dave behavioral1/memory/1120-60-0x0000000000240000-0x0000000000270000-memory.dmp dave -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5e1a03f38a2e9412f185676a52d8e477bccc1ef80827f5181a9af769d4765bcc.exepid process 1120 5e1a03f38a2e9412f185676a52d8e477bccc1ef80827f5181a9af769d4765bcc.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1120-54-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/1120-55-0x00000000002D0000-0x0000000000302000-memory.dmpFilesize
200KB
-
memory/1120-59-0x0000000001D90000-0x0000000001DBF000-memory.dmpFilesize
188KB
-
memory/1120-60-0x0000000000240000-0x0000000000270000-memory.dmpFilesize
192KB
-
memory/1120-61-0x0000000000310000-0x000000000033E000-memory.dmpFilesize
184KB
-
memory/1120-62-0x0000000001D91000-0x0000000001DBF000-memory.dmpFilesize
184KB