Analysis
-
max time kernel
182s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 02:00
Static task
static1
Behavioral task
behavioral1
Sample
919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5.exe
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5.exe
-
Size
88KB
-
MD5
bdbe6f4b40e6e5f30ecc434d89a8bd01
-
SHA1
85e29f9aeb11019531f9ffd79dc91348db44692c
-
SHA256
919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5
-
SHA512
a0d630722a2541c0d098901f0d6cb82e05b96dabbb7d1de246d5c80aef7370ca45bd77c3341df81c33b617a9ebcbaaacd745167c204c4a7fe7967411dd67d27f
-
SSDEEP
1536:Mckxsaxcxk6pLD4z7bBaf3BW5kin66YuOs:MJ9ML8kW5k+ZROs
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5112-133-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5112 919cf528a02ad2608902a2169254c02200f43f9ea3f10ec715e1a58dd07e54a5.exe