Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:47
Behavioral task
behavioral1
Sample
c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4.exe
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4.exe
-
Size
9KB
-
MD5
8ba2001c3326a14fc352ccad23d96b21
-
SHA1
ca023df745d0e0c0329a3900d9f5483876441e87
-
SHA256
c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4
-
SHA512
bc07e29ba4b29982c0c63c49cb2fba02ede3c2d700ac515e0cdbe9f2c0f16b6b35e86cfccf2e3841c17954e93bda9f60cdc845f120260de0be5fd6b1592fe6d5
-
SSDEEP
192:VSHvvsCKjYC3T6Ci5ou2u02Ibpg+5xBizbWb2BVh:cvvq0C3T6CiaFplx4fWbEVh
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3576-132-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3576-133-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\SYSTEM15\yuir.dll c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4.exe File created C:\Windows\SYSTEM15\iecookie.log c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4.exe File created C:\Windows\SYSTEM15\win32ssl.dll c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3576 c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4.exe 3576 c35292ab7455e0493aa6aa24dc50869c3e55be6b08369cd2649923eb9a8f34f4.exe