Analysis
-
max time kernel
339s -
max time network
349s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 04:36
Behavioral task
behavioral1
Sample
79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe
Resource
win7-20221111-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe
Resource
win10v2004-20221111-en
3 signatures
150 seconds
General
-
Target
79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe
-
Size
38KB
-
MD5
754019e21d71c02ede39e4ebd284605d
-
SHA1
ce709301480a2ea94bb8aa0a613cf2f22d6a272e
-
SHA256
79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c
-
SHA512
499062ce8417c4ed17ad319b0c8c0b47d8ff1ac668603ad82b59fdd606393b3a202de111ef2f46cc19d2a9de2115681c2dcbe36c3d8c92b8c6877dd645e0439f
-
SSDEEP
768:gbNpwbPAHObtHKPuGvBe9EZVIKl3EbmLHJIFo7I2NtUop:MKDlRqJBb7Nl3EqGwI2s
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe -
resource yara_rule behavioral2/memory/3120-132-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe 3120 79eef2cb785796f96c55da36aedd8436b100e84bdda23e6c22e47f7d174b7b4c.exe