Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:09
Behavioral task
behavioral1
Sample
21249829dc5d6a0d8f124a2c91334022.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
21249829dc5d6a0d8f124a2c91334022.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
21249829dc5d6a0d8f124a2c91334022.exe
-
Size
542KB
-
MD5
21249829dc5d6a0d8f124a2c91334022
-
SHA1
7229a7e018b33407cb2be29ab7faf7d89ad14ff7
-
SHA256
9eabdd9ae3e3d33f396106303c14889617f30c2a744ddccc414e0646be120b47
-
SHA512
03073b9a1af00cfb0f04bdcd6e9f6fefe020a2693ad112557a51f44ccc641ca381d475e2b35648d7d8af91f4cac23e7d6b9a1dec613f831aa3febdfdfd6bf45d
-
SSDEEP
12288:s5m8ZlWk6VT6qIm9qCZb5rTa8kdVXpPzSb+lSse2HJEIJTy:XO+DD9qCZb5rTa8UPPg9sdJtVy
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1752-0-0x00007FF636550000-0x00007FF636698000-memory.dmp upx behavioral2/memory/1752-1-0x00007FF636550000-0x00007FF636698000-memory.dmp upx behavioral2/memory/1752-26-0x00007FF636550000-0x00007FF636698000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1752-1-0x00007FF636550000-0x00007FF636698000-memory.dmp autoit_exe behavioral2/memory/1752-26-0x00007FF636550000-0x00007FF636698000-memory.dmp autoit_exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\root\CIMV2 21249829dc5d6a0d8f124a2c91334022.exe