Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 04:01
Behavioral task
behavioral1
Sample
5a38da22494faa3bcc30f6a3551c6782.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5a38da22494faa3bcc30f6a3551c6782.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5a38da22494faa3bcc30f6a3551c6782.exe
-
Size
483KB
-
MD5
5a38da22494faa3bcc30f6a3551c6782
-
SHA1
60ca5ce0785f0cfc971d9439369e3cc83aec8b26
-
SHA256
5e77f55252350bdeab73c576a22277350f436a945b36e4b84d04517a06806b91
-
SHA512
e3947891ca00317a9ef341fefe3e53771507728267e4b634dd01958fdb643cd4e2dd7bd2b57e7141757b81e4a5eeef3b212edcbc883dc22a1e7e87541cdab4e9
-
SSDEEP
6144:qAQmrSH8GNvUDERvD9J8F0Czh2uXcqyXJft5:qAQRH8GNvUDERpJwX2uXcF
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2832-0-0x0000000000400000-0x000000000051B000-memory.dmp upx behavioral1/memory/2832-4-0x0000000000400000-0x000000000051B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\259418087.exe 5a38da22494faa3bcc30f6a3551c6782.exe File created C:\Windows\SysWOW64\259422751.exe 5a38da22494faa3bcc30f6a3551c6782.exe