Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 18:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a9e5590ce889e241fb878f47c3a00a7e.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a9e5590ce889e241fb878f47c3a00a7e.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a9e5590ce889e241fb878f47c3a00a7e.exe
-
Size
20KB
-
MD5
a9e5590ce889e241fb878f47c3a00a7e
-
SHA1
132b04b429b679611183a64b912c2a932053ce97
-
SHA256
f1d2db4bfa01be637117670038c84b7b2574d93debb7300f916969441956caf1
-
SHA512
fa5a81fff3eb0aa7a45b8a1d7a6ff76398857a4db05604a5b8932b577489406e160393c408b3259be6a47f07805e4be23ec910b7cb395a6502ce5593e0014014
-
SSDEEP
384:8MSBEEIr58Xm2nhbMbQ3oQCRcX8IkBX47OStmUcVEA30J:8TEEb2AAkpCRcsIkxStmUcV+
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2104 a9e5590ce889e241fb878f47c3a00a7e.exe