Analysis
-
max time kernel
230s -
max time network
249s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 14:21
Behavioral task
behavioral1
Sample
25194e2b66b16b14754913783573154f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
25194e2b66b16b14754913783573154f.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
25194e2b66b16b14754913783573154f.exe
-
Size
1.5MB
-
MD5
25194e2b66b16b14754913783573154f
-
SHA1
51735e4fcb7feb0129d0f20d70483522b0f99363
-
SHA256
04fb174884465df715f603ac0c01685d6f020e05719d906e053f50b83c2ab7c2
-
SHA512
aeecb7673903967e4b295d04b38db2112ce2919032b38155f77060bd9e4f4cd1d7325c60a317f7e2c1349a8fe27a54037d2fa1f1aa80dd10c541116adf8b3751
-
SSDEEP
24576:5pNJJvgexjUv7UTmwvL5Zz1CpePm7MnAMfhAMJlArn1m8G7KkErvJZfCgMhombTY:5HvgexYv4b5/hPmZM5A8Y1ml7BErKimI
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2844-0-0x0000000000400000-0x000000000083D000-memory.dmp upx behavioral2/memory/2844-1-0x0000000000400000-0x000000000083D000-memory.dmp upx behavioral2/memory/2844-2-0x0000000000400000-0x000000000083D000-memory.dmp upx behavioral2/memory/2844-4-0x0000000000400000-0x000000000083D000-memory.dmp upx behavioral2/memory/2844-5-0x0000000000400000-0x000000000083D000-memory.dmp upx behavioral2/memory/2844-6-0x0000000000400000-0x000000000083D000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2844 25194e2b66b16b14754913783573154f.exe 2844 25194e2b66b16b14754913783573154f.exe