Analysis
-
max time kernel
61s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04/08/2023, 14:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
xavHub.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
xavHub.exe
Resource
win10v2004-20230703-en
1 signatures
150 seconds
General
-
Target
xavHub.exe
-
Size
5.0MB
-
MD5
606cdb97c475ca7cb02419294d1b8325
-
SHA1
20b51d428e9a2ee185333f16c991c6ea4ea4e9c2
-
SHA256
1eaefc8ee0bd10dc4fbe069f739e8a147baf8b4452d6511b1ee802c761c24077
-
SHA512
6bc4779058531e1e8724828235bde26f74e2c27b981134dac68dbdab3c8cd847517dde29c4957b96dd0231367931d24352cef7fa465755a37c5b6d3247da6b03
-
SSDEEP
98304:IzjuCvE/t7ZCWqrxToDqMZxNVigngWBCUY9rF5OfTdn2603Irj5W94z9OUSa:fJ/tVrMt4qMZxNoggICUurF5OWydW94O
Score
7/10
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2896-57-0x00000000068C0000-0x0000000006A7E000-memory.dmp agile_net behavioral1/memory/2896-58-0x0000000006D50000-0x0000000006E9A000-memory.dmp agile_net -
Program crash 1 IoCs
pid pid_target Process procid_target 3048 2896 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3048 2896 xavHub.exe 28 PID 2896 wrote to memory of 3048 2896 xavHub.exe 28 PID 2896 wrote to memory of 3048 2896 xavHub.exe 28 PID 2896 wrote to memory of 3048 2896 xavHub.exe 28