Analysis
-
max time kernel
37s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 00:59
Behavioral task
behavioral1
Sample
ec692d2b4e0dd7f24cba21e0cffac5c63a7b27b3499d1239ed46df4daea59b52.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ec692d2b4e0dd7f24cba21e0cffac5c63a7b27b3499d1239ed46df4daea59b52.exe
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
ec692d2b4e0dd7f24cba21e0cffac5c63a7b27b3499d1239ed46df4daea59b52.exe
-
Size
231KB
-
MD5
c64b4b7d8369fd4559e1a07938ab5f05
-
SHA1
d30fbdb529bb7fa450720f1a56a0dbb80622b4b7
-
SHA256
ec692d2b4e0dd7f24cba21e0cffac5c63a7b27b3499d1239ed46df4daea59b52
-
SHA512
854adccf46e2b797fcd69ae334bf54d91b7b30b2a38e4c572658ba418a943246adef5d5bb873adf3cc058077ae94ce6738cdb9e47837825a1a07b467c2ed613f
-
SSDEEP
3072:hUs34eEoA6GhpX4FivXIjAUbahCP3rNS2M676jpY3amPtiE16jwCXg:2wEoAhX4svXXDQFMnIamZ
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/744-55-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 744 ec692d2b4e0dd7f24cba21e0cffac5c63a7b27b3499d1239ed46df4daea59b52.exe