Analysis
-
max time kernel
26s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 13:21
Behavioral task
behavioral1
Sample
87f69ae1890d37cb7be13fef3563c1cc0fa414203dda873132a20e38d7d07a36.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
87f69ae1890d37cb7be13fef3563c1cc0fa414203dda873132a20e38d7d07a36.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
87f69ae1890d37cb7be13fef3563c1cc0fa414203dda873132a20e38d7d07a36.exe
-
Size
99KB
-
MD5
4d678ec72572b011b9b4529c8d1b0de3
-
SHA1
2bcf831e69dbc93f59778357e18c35e1e18d3a84
-
SHA256
87f69ae1890d37cb7be13fef3563c1cc0fa414203dda873132a20e38d7d07a36
-
SHA512
9ee993aba2fc82d4e3572320bfb5f1f1016e77afdda7f650e2a6c10157eb2f57d48eaecffe9e7d39a1a5828383fe1105ffd21248ac2413902b4a3d235aad2a40
-
SSDEEP
3072:Ewi089AvUB1LZPE1AAQvCTjE/j15AY41C:I0wB1LlyVb+15AYF
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1276-54-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 87f69ae1890d37cb7be13fef3563c1cc0fa414203dda873132a20e38d7d07a36.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1276 87f69ae1890d37cb7be13fef3563c1cc0fa414203dda873132a20e38d7d07a36.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87f69ae1890d37cb7be13fef3563c1cc0fa414203dda873132a20e38d7d07a36.exe"C:\Users\Admin\AppData\Local\Temp\87f69ae1890d37cb7be13fef3563c1cc0fa414203dda873132a20e38d7d07a36.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1276