Analysis
-
max time kernel
119s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 23:33
Behavioral task
behavioral1
Sample
6422a0f6048af4db488c581a1f8113f0e6d9b736ce96f2827b2987135090001e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6422a0f6048af4db488c581a1f8113f0e6d9b736ce96f2827b2987135090001e.exe
Resource
win10v2004-20221111-en
General
-
Target
6422a0f6048af4db488c581a1f8113f0e6d9b736ce96f2827b2987135090001e.exe
-
Size
232KB
-
MD5
eafe3868b2b3093ccc46d7dc1b34fe95
-
SHA1
2c57371c5db9400a2c68ec27e8052f2faba4b6f2
-
SHA256
6422a0f6048af4db488c581a1f8113f0e6d9b736ce96f2827b2987135090001e
-
SHA512
248afd894d649ab3440812b8f900d4a5df28f600d8b7cd4f3e241002e183d16bd7416494b40c7282f5b153118ce1309024408f6a90092a26b3790024ba4d6596
-
SSDEEP
6144:t9kW9pME2UBcfDszez1ctT1oJeyPllc3:fpSEpBcoez0xoYyNlc3
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1252-55-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral1/memory/1252-56-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral1/memory/1252-59-0x0000000000400000-0x000000000049E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1252 6422a0f6048af4db488c581a1f8113f0e6d9b736ce96f2827b2987135090001e.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD53d5b3a91f8a9f212066545097d4992b4
SHA1af65d21c2269da258ed7ced7e0d5dc7307b28b0e
SHA2568fce90b43afb03eb26acde7cccb2f8defec6a6eff4bd6c401883c7f78642da4c
SHA512a3148aedd80a34886333ae9af6b0aaac2302b2696f44eb2528a43e737b972ee686a6ba4e97bb3a1ffaaba039e61b7395ef053aa991a2dce397b1ab0d727f9888