Analysis
-
max time kernel
136s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 16:54
Behavioral task
behavioral1
Sample
c11da022ff8345cac07a22265d63a5a7.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c11da022ff8345cac07a22265d63a5a7.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
c11da022ff8345cac07a22265d63a5a7.exe
-
Size
18KB
-
MD5
c11da022ff8345cac07a22265d63a5a7
-
SHA1
e6bb1ce3d0dd02f5ef48125938c1ef5c9356a43c
-
SHA256
385decf9b3f25a17128a7f3d7f1ca43e9db0a3cbb1a8af529fdeee1688d7d580
-
SHA512
21e7f533bfd259e2485d8545c328caf5ff07eecdca9041addcc80d9c4c60d4040f910ec9c66fe1bf1ceed4979e716828df75b838c092eeb12c9014b901dd7b71
-
SSDEEP
384:Abq/gnB8Vgrt0fjBhmrRSbe1oadrhG0RKKsjZNsM0:A0a8Vgr+/mrT1fdrA00KON7
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3812-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/3812-1-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/3812-2-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3812 c11da022ff8345cac07a22265d63a5a7.exe 3812 c11da022ff8345cac07a22265d63a5a7.exe