Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 20:33
Behavioral task
behavioral1
Sample
3b88c157bfe313467463bba3dcce4d34.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b88c157bfe313467463bba3dcce4d34.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
3b88c157bfe313467463bba3dcce4d34.exe
-
Size
1.5MB
-
MD5
3b88c157bfe313467463bba3dcce4d34
-
SHA1
14cc2144762e94129551ff49ad742f2b9f800e6a
-
SHA256
14ad8f26d0d74d214d4a6c40a9e78e924f07db3e3781a966e63244342c4bbe86
-
SHA512
c6a3b3675624cd01e86ff29ab597b5cddbd232888a9a62269c9c73d76b8c1643f24f2052d4ad831317a208e63eee0e6c4c8dd1c55a1be5f297b51fa698bfb8d5
-
SSDEEP
24576:HpNJJvgexjUv7UTmwvL5Zz1CpePm7MnAMfhAMJlArn1m8G7KkErJV9n6tpV0E:HHvgexYv4b5/hPmZM5A8Y1ml7BErJz0L
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2556-0-0x0000000000400000-0x000000000083D000-memory.dmp upx behavioral2/memory/2556-2-0x0000000000400000-0x000000000083D000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2556 3b88c157bfe313467463bba3dcce4d34.exe 2556 3b88c157bfe313467463bba3dcce4d34.exe