Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 05:37
Behavioral task
behavioral1
Sample
42e4a4b3e2ffeb9214492ea0a0e00137.exe
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
42e4a4b3e2ffeb9214492ea0a0e00137.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
42e4a4b3e2ffeb9214492ea0a0e00137.exe
-
Size
52KB
-
MD5
42e4a4b3e2ffeb9214492ea0a0e00137
-
SHA1
249037a970ad7e50b8b0c7368a91b0a0ad3e79c1
-
SHA256
e43251227ab9229f0a550a0e1ce85881982d7a8d517cb5053ba5dbf574dde933
-
SHA512
b9f51c4b7c387219719ac34ad82b88bb32b04c63663918287464cc7cdcf4dd2468200c3c81fbe91f8f60e38051ab3fcdfaf1c67e802680d4ee0d0432b4b626f9
-
SSDEEP
768:7mJ0wT6sUU/iGiFuhsSSIAO/3FKydzs0BLTcT:iwsULBuhmI7drBLTcT
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4272-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4272-1-0x0000000000400000-0x000000000040F000-memory.dmp upx