Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 08:30
Behavioral task
behavioral1
Sample
2b1b2e2b385c22f12d16b626f6ceeb713eff7f152c6225ee9bc49d8609a6c7d9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2b1b2e2b385c22f12d16b626f6ceeb713eff7f152c6225ee9bc49d8609a6c7d9.exe
Resource
win11-20240508-en
General
-
Target
2b1b2e2b385c22f12d16b626f6ceeb713eff7f152c6225ee9bc49d8609a6c7d9.exe
-
Size
128KB
-
MD5
13f784b718e0d45057b628f504a11235
-
SHA1
9f06af54f5ae22e32811d85344468bed4bde28ab
-
SHA256
2b1b2e2b385c22f12d16b626f6ceeb713eff7f152c6225ee9bc49d8609a6c7d9
-
SHA512
3e5e6d2bf9d40a90baf55f580289512b6b95f8aa5c9842f7f925a8faaae374e61b738ea01d3bcfd7b30427226d8d4291947822da2134b33f74a9eea7f20fb0e7
-
SSDEEP
1536:v8OJN+kiHVKeBEOAe9zRozT9CmGMlwLl0x8w8qW0KMhXO+kKDZdpXmdAdklV/Mgs:vZJN+FDXAPR7ILl0+50u+kKVzdCf/zx+
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2452-0-0x00007FF67CBF0000-0x00007FF67CC34000-memory.dmp upx behavioral1/memory/2452-3-0x00007FF67CBF0000-0x00007FF67CC34000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b1b2e2b385c22f12d16b626f6ceeb713eff7f152c6225ee9bc49d8609a6c7d9.exe"C:\Users\Admin\AppData\Local\Temp\2b1b2e2b385c22f12d16b626f6ceeb713eff7f152c6225ee9bc49d8609a6c7d9.exe"1⤵PID:2452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4208,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=4116 /prefetch:81⤵PID:3916