Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 10:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
50597236dd3721c3192223e31afdf0a3.exe
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
50597236dd3721c3192223e31afdf0a3.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
50597236dd3721c3192223e31afdf0a3.exe
-
Size
506KB
-
MD5
50597236dd3721c3192223e31afdf0a3
-
SHA1
e0855c726fc1f9905105163c998a3abcdb5e66d2
-
SHA256
071e636b58ff793591783871db8d5dd696112dbea755b148b8dd5c673ea18282
-
SHA512
de0d04a5ed4bbb4d6b48825855f50eed121ff0c2f6ca01b0251b013ba025d0e319a7ced9667e5c8dd102dc0297aa836fed0e426b426c17aad510938388120d49
-
SSDEEP
6144:fcL5F2lVPlrXOdJDrZLmY5Z7SfYrT5Qq/T3/8Jkne8iJ9tvhhs4aBTq0rdlB:2F2lVPderZL7LufYF73kGnY9tvhS4+B
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\jamamalog0110.txt 50597236dd3721c3192223e31afdf0a3.exe