Analysis
-
max time kernel
98s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 16:00
Behavioral task
behavioral1
Sample
c06a3ac5b41b9cd82d7db86b9d1e086e20094f3b1884070ae570eb1a44f6b871.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c06a3ac5b41b9cd82d7db86b9d1e086e20094f3b1884070ae570eb1a44f6b871.exe
Resource
win10v2004-20220901-en
General
-
Target
c06a3ac5b41b9cd82d7db86b9d1e086e20094f3b1884070ae570eb1a44f6b871.exe
-
Size
191KB
-
MD5
051224ad6bbaa7c1a8c113acab98b5b3
-
SHA1
ebea01dd9ac61d44041bd461bbd919607c9790de
-
SHA256
c06a3ac5b41b9cd82d7db86b9d1e086e20094f3b1884070ae570eb1a44f6b871
-
SHA512
fcb1be28de715105586e47e5b985a00020bbde60bddda40d783bddfcf8a76be6b0508229c131266b5de39de4780e7e73fca2c043538561bd9245d72f2ed5ae7b
-
SSDEEP
3072:JuOaGHdeZ3VOcEu3lNhe70YHmTkq1NVfa33T05Fqvq+jlb8Z4MjEbWCzt:JuxCdedVCyn873Hm42jfa3j0sL44MjEr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/632-132-0x0000000000400000-0x0000000000487000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\NR3259878.txt c06a3ac5b41b9cd82d7db86b9d1e086e20094f3b1884070ae570eb1a44f6b871.exe