Analysis
-
max time kernel
237s -
max time network
344s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:29
Static task
static1
Behavioral task
behavioral1
Sample
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174.exe
Resource
win10v2004-20221111-en
General
-
Target
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174.exe
-
Size
73KB
-
MD5
5eb1cb0f72c076b517fc80523efb7fe0
-
SHA1
392d1532a8b228784fab0340e3f8afb20ea14e7e
-
SHA256
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174
-
SHA512
fb2b6be0f754f0b881c33a5b37c785ea5d2b20f51d7840fcbb61d4166037804b008f346bed036812f4588aee483c7dbc0408c06bbbcf449496b4435c04ae44fe
-
SSDEEP
768:2OqYhhncSR7NWfZFfaLWO169V5VvHZ3m11ahpXl5TKgC10LscDf741lL:2Cfcmc/iL116JFHZLx5TKV0LsO741lL
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/544-56-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174.exepid process 544 66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174.exe