Analysis
-
max time kernel
328s -
max time network
402s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 05:11
Behavioral task
behavioral1
Sample
b3d09152fdb4dce759f3d44282ca958782a30423137c97825750a9702175d5af.exe
Resource
win7-20221111-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
b3d09152fdb4dce759f3d44282ca958782a30423137c97825750a9702175d5af.exe
Resource
win10v2004-20221111-en
3 signatures
150 seconds
General
-
Target
b3d09152fdb4dce759f3d44282ca958782a30423137c97825750a9702175d5af.exe
-
Size
227KB
-
MD5
4408d149feec268334cf878960468334
-
SHA1
5127089c4bf3378151f73db0addac51ff244c200
-
SHA256
b3d09152fdb4dce759f3d44282ca958782a30423137c97825750a9702175d5af
-
SHA512
c132307a2b01d6ec5ed45319a7679110f531235483875c05741e85b6355b8961830221b8aa7add3c113c0f6169050cb269acc42a7e8da8187e29e693daab5475
-
SSDEEP
3072:obQi390ezV3Q7RcaDryukKLeC1TkGNmCjxqX/fI/x0s29ygBqQkmDRK:oR39JsXryukHCRXmCjxqX3LZBOE
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2492-132-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job b3d09152fdb4dce759f3d44282ca958782a30423137c97825750a9702175d5af.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 b3d09152fdb4dce759f3d44282ca958782a30423137c97825750a9702175d5af.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3d09152fdb4dce759f3d44282ca958782a30423137c97825750a9702175d5af.exe"C:\Users\Admin\AppData\Local\Temp\b3d09152fdb4dce759f3d44282ca958782a30423137c97825750a9702175d5af.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
PID:2492