Analysis
-
max time kernel
2s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 06:21
Behavioral task
behavioral1
Sample
f9a794292d3e4ebb0d18602ddd98bdaa83745965772cedcf3b6c39ae457548ca.exe
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
f9a794292d3e4ebb0d18602ddd98bdaa83745965772cedcf3b6c39ae457548ca.exe
Resource
win10v2004-20220812-en
1 signatures
150 seconds
Errors
Reason
platform exec: image=C:\Users\Admin\AppData\Local\Temp\f9a794292d3e4ebb0d18602ddd98bdaa83745965772cedcf3b6c39ae457548ca.exe
command="C:\Users\Admin\AppData\Local\Temp\f9a794292d3e4ebb0d18602ddd98bdaa83745965772cedcf3b6c39ae457548ca.exe"
wdir=C:\Users\Admin\AppData\Local\Temp
Payload error: The %1 application cannot be run in Win32 mode.
General
-
Target
f9a794292d3e4ebb0d18602ddd98bdaa83745965772cedcf3b6c39ae457548ca.exe
-
Size
56KB
-
MD5
0808d201703f580e5605f07977f386a3
-
SHA1
bbaae02517a0b0164c01dcee84c868e1745d6122
-
SHA256
f9a794292d3e4ebb0d18602ddd98bdaa83745965772cedcf3b6c39ae457548ca
-
SHA512
2cd2b9c0ab801e7d69d38dfb1cda3802174af8d35e3d42852422921382bf1bd43268b93aa52e4f2fedb29d7cf3dc137aa785c373512faeba7489b1155a820f13
-
SSDEEP
1536:Hoq9Mdmw0zs2K6CYgqsUCU5OqcmdP3Xpc:HGmzgq5pPJc
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5064-132-0x0000000000010000-0x000000000001E000-memory.dmp vmprotect