Analysis
-
max time kernel
134s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 14:01
Behavioral task
behavioral1
Sample
74054e00c49543103a07b8e7bc60d1fa.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
74054e00c49543103a07b8e7bc60d1fa.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
74054e00c49543103a07b8e7bc60d1fa.exe
-
Size
518KB
-
MD5
74054e00c49543103a07b8e7bc60d1fa
-
SHA1
bbec31e1bbbd7f015f60658f3f47857c00a0d31a
-
SHA256
bdd2dff7e5e6b72df000a71087cf1c3463d76af8409149e55477acef51dd9280
-
SHA512
0dbd29f91366f23f33cb05a92d35779c35ec60a1865ba03ad66573102caef4dc52fcdf821ebd382c08f2924b75db2a8557fd941a49f8a7b18947e4441b248968
-
SSDEEP
12288:VneyKzX4hR6IWoy0ifx8ju91LBtg7Gr6MUC3jVWug:Ve/zXWWoypxr911f+MU8VW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3092-0-0x0000000047010000-0x0000000047093000-memory.dmp upx behavioral2/memory/3092-2-0x0000000047010000-0x0000000047093000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Java\jre3.1\bin\javaswss.txt 74054e00c49543103a07b8e7bc60d1fa.exe