Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:45
Behavioral task
behavioral1
Sample
26d691f18b4a557b17fa8ff15191825d.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
26d691f18b4a557b17fa8ff15191825d.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
26d691f18b4a557b17fa8ff15191825d.exe
-
Size
14KB
-
MD5
26d691f18b4a557b17fa8ff15191825d
-
SHA1
808ea4d33b652325e78da5bb8811523bcba22b3f
-
SHA256
5ec5c3c4e9c44ef109a8f27578f0c3f6dc52fbcd93715b80c4dcab0dcbc28c55
-
SHA512
8a4278b4f4d95c24e16afa22bc1e0347ac3269d745380ec39f0de54a1ecc083d14198966e315489dac2d71455d95db255a7478b8592f10c80d8a5f8fb9d0248f
-
SSDEEP
384:fo9q5pG7Vbjz0QhuvmtSh/6kTMklKBcdDtI7JliSwlmerfVjuujQA+CJwcn:GqDSbP0w+mFko/B8I7JUSiVfVyLA+Kxn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5088-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/5088-2-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5088 26d691f18b4a557b17fa8ff15191825d.exe