Analysis
-
max time kernel
185s -
max time network
230s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 08:32
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
file.exe
-
Size
3.5MB
-
MD5
df21f5ad40255a79d5b308c45346fc18
-
SHA1
4493b39a526899d4f38ff2cb847c5e2eab4b5d64
-
SHA256
adc91b86359875df0149a283a6dbf6c11a9d6e4fd494c1340f20b3324571bdda
-
SHA512
4a0788dd71359f3d947c21320fdbf2575dc2457c946ac692a33dad5719a0ad4598f8af5cd8b59c1635d9b9b7917f55797050dd06c3e3f7883a5858fa05fd6693
-
SSDEEP
49152:eUeRff2eGxrSEj/sSfFXOq1U2MU90FDO9k7oVYs00o6CaEZfytGO2PagJ7gGHejX:evuXWKNRh1X0K9k0VYs0rASwe9+j0wn
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4940-132-0x0000000140000000-0x0000000140618000-memory.dmp vmprotect
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4940-132-0x0000000140000000-0x0000000140618000-memory.dmpFilesize
6.1MB