Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 20:37
Behavioral task
behavioral1
Sample
4720b210215997568a4e37df70b1b0b4.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4720b210215997568a4e37df70b1b0b4.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4720b210215997568a4e37df70b1b0b4.exe
-
Size
5KB
-
MD5
4720b210215997568a4e37df70b1b0b4
-
SHA1
78ce96cc0e4504839fec61e38b6c9d8358982427
-
SHA256
10ea5f603ef88661f073af4a8ffafa8f4905c3c9ff444da4c9c04712cbb5d050
-
SHA512
b0caa56702003e5cdd91b9e2384d5a33c0b43f9a64ced479af9ec69b6362cde45870cc36d9a47d0608a1b5bfc9cfd595feecb2759008b43515b70732e6b37848
-
SSDEEP
96:GAHnn8ic2M7o8RdE2herZ/YiGg6VEVgBwB/TBDImWqGm8o:GAnc5o2GaerBP/FIm9Gmz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1196-0-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/1196-1-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe 1196 4720b210215997568a4e37df70b1b0b4.exe