Analysis
-
max time kernel
41s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 13:15
Behavioral task
behavioral1
Sample
bde2dcd39cc8833f31ad5f2cb6c9db5657e2fcfaf50b313dca10d71df7c150f2.exe
Resource
win7-20221111-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
bde2dcd39cc8833f31ad5f2cb6c9db5657e2fcfaf50b313dca10d71df7c150f2.exe
Resource
win10v2004-20221111-en
3 signatures
150 seconds
General
-
Target
bde2dcd39cc8833f31ad5f2cb6c9db5657e2fcfaf50b313dca10d71df7c150f2.exe
-
Size
99KB
-
MD5
dfce2015f9019ea01e343728c79a33b0
-
SHA1
df69a1940af21a8149eab3f71a9da258e79ca0a6
-
SHA256
bde2dcd39cc8833f31ad5f2cb6c9db5657e2fcfaf50b313dca10d71df7c150f2
-
SHA512
ecc146840b687e8c92a34751bbde3fdcb7672088d15af3bacde28a227d2bf6c50c224c258c5e6155463556244100c2f7c436f7348e978d7bd1176a094946c2c5
-
SSDEEP
3072:Awi089AvUB1LZPE1AAQvCTjE/j15AY41C:M0wB1LlyVb+15AYF
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1172-54-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1172 bde2dcd39cc8833f31ad5f2cb6c9db5657e2fcfaf50b313dca10d71df7c150f2.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1172 bde2dcd39cc8833f31ad5f2cb6c9db5657e2fcfaf50b313dca10d71df7c150f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde2dcd39cc8833f31ad5f2cb6c9db5657e2fcfaf50b313dca10d71df7c150f2.exe"C:\Users\Admin\AppData\Local\Temp\bde2dcd39cc8833f31ad5f2cb6c9db5657e2fcfaf50b313dca10d71df7c150f2.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1172