Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 23:24
Behavioral task
behavioral1
Sample
c45faa02fdd378d5098f1e4132e3fbac.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c45faa02fdd378d5098f1e4132e3fbac.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
c45faa02fdd378d5098f1e4132e3fbac.exe
-
Size
5.3MB
-
MD5
c45faa02fdd378d5098f1e4132e3fbac
-
SHA1
c3c4535fa1032d8110db264a2c386c6bb5bd4de8
-
SHA256
c5e6c279e9383f9f26903381952a2b9f623f6b8a0c724bfaa5fc38ca69825423
-
SHA512
8660abbd84464ea61e3884899afe3f3c5052ba1095ced6fdb9cb1f5154b3d915c3071bea65a2c4269f335f45de242d67542674d4769b51dca381b7decaa4019d
-
SSDEEP
98304:je4cj4NrLIeoLWO342nLzGFTLlyCxGE8ZQZj/PPxyt:Y4CeJs4MGFTECUEjj/RG
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3040-3-0x000000013F4D0000-0x000000013FDBD000-memory.dmp vmprotect behavioral1/memory/3040-6-0x000000013F4D0000-0x000000013FDBD000-memory.dmp vmprotect behavioral1/memory/3040-10-0x000000013F4D0000-0x000000013FDBD000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3040 c45faa02fdd378d5098f1e4132e3fbac.exe