Analysis
-
max time kernel
199s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:15
Behavioral task
behavioral1
Sample
6708435bf3f114ec6ccbef93fd9a748f8f782a5905ee6131e0fa157e40f5bb47.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6708435bf3f114ec6ccbef93fd9a748f8f782a5905ee6131e0fa157e40f5bb47.exe
Resource
win10v2004-20221111-en
General
-
Target
6708435bf3f114ec6ccbef93fd9a748f8f782a5905ee6131e0fa157e40f5bb47.exe
-
Size
361KB
-
MD5
a1b018a89c0413472bab8a4b4e6d4f21
-
SHA1
df02e3f25461e9d8741ff41c2365fc79188ffd82
-
SHA256
6708435bf3f114ec6ccbef93fd9a748f8f782a5905ee6131e0fa157e40f5bb47
-
SHA512
8e4968497b2f9ec0d6969ed3445fa3319baa6d833613e4013e60a79a6eb79315780f629f0a49948036ce19b5021d6c38fff848bba5d2b518f5b3f92c5d5aaf78
-
SSDEEP
6144:VC6GdZJ7Rt6+5J/vhqQ1TBlzwXkNp2WmRF/PJlxzleVVB7H1izUZ:06GDVhqADsXAsflzeVVDioZ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1460-132-0x0000000000400000-0x0000000000506000-memory.dmp vmprotect behavioral2/memory/1460-133-0x0000000000400000-0x0000000000506000-memory.dmp vmprotect behavioral2/memory/1460-135-0x0000000000400000-0x0000000000506000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6708435bf3f114ec6ccbef93fd9a748f8f782a5905ee6131e0fa157e40f5bb47.exepid process 1460 6708435bf3f114ec6ccbef93fd9a748f8f782a5905ee6131e0fa157e40f5bb47.exe 1460 6708435bf3f114ec6ccbef93fd9a748f8f782a5905ee6131e0fa157e40f5bb47.exe