Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 01:09
Behavioral task
behavioral1
Sample
d78a19673ee6547043614a9225a762e6.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d78a19673ee6547043614a9225a762e6.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
d78a19673ee6547043614a9225a762e6.exe
-
Size
225KB
-
MD5
d78a19673ee6547043614a9225a762e6
-
SHA1
e9d4d1957613ddc4e9de59fea3eab171472535ca
-
SHA256
afd12e74f42528e406be8dded60891a6d70b59ba8a270793ff9b9252b8d1f1c8
-
SHA512
eab14cf7b2e8f33b12949c9d0f0f86ad8e15cf9d68b9fe0f5a2c31a7aab35d092a357e83c559cf3dfce3caf5190cc86e71b63ba3bec9d3c2d35aba7dbaea34c6
-
SSDEEP
6144:0nesz+ipvvt0yTdnOmYcPYQb2xgxorgJZlJBGL:0v+KtHJDP8LelJBq
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1736-0-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1736-2-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1736-3-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1736-5-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\my_point\tmp_down.ini d78a19673ee6547043614a9225a762e6.exe