Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 18:28
Behavioral task
behavioral1
Sample
0988c8856470af72b159fc18cd8b734178aa496594a019a51eda2af45da15260.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0988c8856470af72b159fc18cd8b734178aa496594a019a51eda2af45da15260.exe
Resource
win10v2004-20240426-en
General
-
Target
0988c8856470af72b159fc18cd8b734178aa496594a019a51eda2af45da15260.exe
-
Size
124KB
-
MD5
888212e7d5eaefdde101d7ebbc35e5c2
-
SHA1
69f147f9d9fcf9008e535fd1703c3e1d0eabb801
-
SHA256
0988c8856470af72b159fc18cd8b734178aa496594a019a51eda2af45da15260
-
SHA512
81b79d7cd639f022924d2fa10b15b99e8158d816bb6871218832230a14fca16b13544f1882f5cb879a7964a013112934f1823ab72338029495c54c6eabb79d6f
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxrTmXadjUSbcDemTPAZk+cLtdNlb9PfESDOayW:KQSoS6W2QZwKS7Z
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4440-0-0x0000000000400000-0x000000000040A000-memory.dmp UPX behavioral2/memory/4440-1-0x0000000000400000-0x000000000040A000-memory.dmp UPX -
Processes:
resource yara_rule behavioral2/memory/4440-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/4440-1-0x0000000000400000-0x000000000040A000-memory.dmp upx