Analysis
-
max time kernel
100s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16/02/2023, 16:45
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
13.0MB
-
MD5
747993ff11324079472ac0810b4c21e7
-
SHA1
1ab3909e6b07bd0d2c381e9d31031e9a3eaef45f
-
SHA256
a17505621fb5552d486255ed81cb84c4f88b6021e5996a0edae1805b8f9b0b32
-
SHA512
d0e0d4bd9561f893d5a6c40f5eaae98e0d6ac4a96385ddb0351235642c48f4561c4dca4700d375e17bc8fb8989d4888210987fee67541e700b137c4c4754f96e
-
SSDEEP
196608:R5bVr6da8b4Ae6hPgJuHfRc86EPOulPvmc47aiLUkSG6AS4Af0WrDdEuGLGMNUII:dm9f1HfrO0PvmraiL+waNEu22I/nA
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1940-54-0x0000000000400000-0x0000000001972000-memory.dmp themida behavioral1/memory/1940-55-0x0000000000400000-0x0000000001972000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1940 tmp.exe 1940 tmp.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1940 tmp.exe