Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:13
Behavioral task
behavioral1
Sample
22a2d0fc9b5665c4354da38f5a4451ff.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
22a2d0fc9b5665c4354da38f5a4451ff.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
22a2d0fc9b5665c4354da38f5a4451ff.exe
-
Size
15KB
-
MD5
22a2d0fc9b5665c4354da38f5a4451ff
-
SHA1
e166a4a54978f050bda22de07ebbdd4798205330
-
SHA256
c735db3dd86505c028d3a81fe53bac34575f1004c446a9af67f020548e676f22
-
SHA512
46b4bb86ec6288147d824ed077954c2faccba520051937f1169e9b8f1606919433c1575a4e77faa31baa76ed051a99e7146e2f33344ce5acf1d007f0aea1e4df
-
SSDEEP
384:Yb8bM0q6Hag18wnYP3XGec0VdIvuwjuWHHU85Rfg3XkH:YwbDq6HagGnU0VanVx5O3UH
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2264-1-0x0000000000400000-0x000000000040C677-memory.dmp upx behavioral1/memory/2264-0-0x0000000000400000-0x000000000040C677-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\22a2d0fc9b5665c4354da38f5a4451ff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\22a2d0fc9b5665c4354da38f5a4451ff.exe" 22a2d0fc9b5665c4354da38f5a4451ff.exe