Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 05:00
Behavioral task
behavioral1
Sample
bfdcdd74ec78464476796b3448bb8eaaded8f653d0a98e74624cc0a059633fcf.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
bfdcdd74ec78464476796b3448bb8eaaded8f653d0a98e74624cc0a059633fcf.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
bfdcdd74ec78464476796b3448bb8eaaded8f653d0a98e74624cc0a059633fcf.exe
-
Size
99KB
-
MD5
7eca5cde539f624c0061d1ecde5eac2c
-
SHA1
43179626add567e6b20b544ed98ec198e8c49c02
-
SHA256
bfdcdd74ec78464476796b3448bb8eaaded8f653d0a98e74624cc0a059633fcf
-
SHA512
0f92622fd482ef10104b69b8335f6647cc20148b6e106936b7c3fa41a486bc2d3faeef3c95df20af7aeaa29a95452c2cc73eaf46d6f47c73babec836e3cea51c
-
SSDEEP
3072:Ywi089AvUB1LZPE1AAQvCTjE/j15AY41C:00wB1LlyVb+15AYF
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/532-54-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 532 bfdcdd74ec78464476796b3448bb8eaaded8f653d0a98e74624cc0a059633fcf.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 532 bfdcdd74ec78464476796b3448bb8eaaded8f653d0a98e74624cc0a059633fcf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfdcdd74ec78464476796b3448bb8eaaded8f653d0a98e74624cc0a059633fcf.exe"C:\Users\Admin\AppData\Local\Temp\bfdcdd74ec78464476796b3448bb8eaaded8f653d0a98e74624cc0a059633fcf.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:532