Analysis
-
max time kernel
4s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 05:01
Behavioral task
behavioral1
Sample
6b0f4bc3874ff3e0c5e5ebd2c2e1fb3800d4f0814af5906d6ecdeb6cf2707ffd.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6b0f4bc3874ff3e0c5e5ebd2c2e1fb3800d4f0814af5906d6ecdeb6cf2707ffd.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
6b0f4bc3874ff3e0c5e5ebd2c2e1fb3800d4f0814af5906d6ecdeb6cf2707ffd.exe
-
Size
99KB
-
MD5
cb3ae4716581129c1984d059ead17ff5
-
SHA1
fdad4e36490b7119e54678562de22e0152dccd95
-
SHA256
6b0f4bc3874ff3e0c5e5ebd2c2e1fb3800d4f0814af5906d6ecdeb6cf2707ffd
-
SHA512
a95d12242156431839f4c1ff85c95d0ff7e54414e480982a730c0a8c227fed2bb4d06bcb10ddadb8b492b3eaa5ea3a3c8d1ededf66cf4e9ee5c2899c71bec196
-
SSDEEP
3072:4wi089AvUB1LZPE1AAQvCTjE/j15AY41C:U0wB1LlyVb+15AYF
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1640-54-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1640 6b0f4bc3874ff3e0c5e5ebd2c2e1fb3800d4f0814af5906d6ecdeb6cf2707ffd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1640 6b0f4bc3874ff3e0c5e5ebd2c2e1fb3800d4f0814af5906d6ecdeb6cf2707ffd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b0f4bc3874ff3e0c5e5ebd2c2e1fb3800d4f0814af5906d6ecdeb6cf2707ffd.exe"C:\Users\Admin\AppData\Local\Temp\6b0f4bc3874ff3e0c5e5ebd2c2e1fb3800d4f0814af5906d6ecdeb6cf2707ffd.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1640