Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 23:18
Behavioral task
behavioral1
Sample
74b883a4466ecbde44561e86e559c501a688b2b4c7d3766a92280d9f42ac2a17.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
74b883a4466ecbde44561e86e559c501a688b2b4c7d3766a92280d9f42ac2a17.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
74b883a4466ecbde44561e86e559c501a688b2b4c7d3766a92280d9f42ac2a17.exe
-
Size
99KB
-
MD5
71abb922528264510a213c3a3665a853
-
SHA1
c39dcdfdc8f4b47c09e5df1ecf5d3ea2275ce38c
-
SHA256
74b883a4466ecbde44561e86e559c501a688b2b4c7d3766a92280d9f42ac2a17
-
SHA512
15dc0d8498e8c50ff65c271cd2be8aa43c5786b276ee7bfdd01ab94832c897b1abe29733f223790174ca2de492b08d4eb7c88713db2c2c06e8ac5146477e889f
-
SSDEEP
3072:owi089AvUB1LZPE1AAQvCTjE/j15AY41C:E0wB1LlyVb+15AYF
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1052-54-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1052 74b883a4466ecbde44561e86e559c501a688b2b4c7d3766a92280d9f42ac2a17.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1052 74b883a4466ecbde44561e86e559c501a688b2b4c7d3766a92280d9f42ac2a17.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b883a4466ecbde44561e86e559c501a688b2b4c7d3766a92280d9f42ac2a17.exe"C:\Users\Admin\AppData\Local\Temp\74b883a4466ecbde44561e86e559c501a688b2b4c7d3766a92280d9f42ac2a17.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1052