Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 15:53
Behavioral task
behavioral1
Sample
3a7af81d1de4be1b0cd1d1f8124aa882.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a7af81d1de4be1b0cd1d1f8124aa882.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
3a7af81d1de4be1b0cd1d1f8124aa882.exe
-
Size
133KB
-
MD5
3a7af81d1de4be1b0cd1d1f8124aa882
-
SHA1
f975957c7758da2f69e23daf07937d56d33f5c9a
-
SHA256
901a53ae5313be5b0959f84a643d444fe0b1f9fdc0ca3109b5ec3fc6a7567312
-
SHA512
efde565d9836e0fe9c96523001325db5d422a9c16dddef6764104416bd0fb93d66f32fa2dd5adf4b541adb59e5d94cebb69c8d9177ba26c0f39e628f73e7c7f6
-
SSDEEP
3072:l/VvYZCI1fnYoVXReeIPoP4RioAHZt2l+c0yQ:l5yCIPfIPoP4RTAX40yQ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1736-0-0x0000000000400000-0x0000000000486000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1736 3a7af81d1de4be1b0cd1d1f8124aa882.exe