Analysis
-
max time kernel
110s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 03:05
Behavioral task
behavioral1
Sample
404998a70123f1613027871ad389b000N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
404998a70123f1613027871ad389b000N.exe
Resource
win10v2004-20240709-en
General
-
Target
404998a70123f1613027871ad389b000N.exe
-
Size
83KB
-
MD5
404998a70123f1613027871ad389b000
-
SHA1
f5c2c1b560e8e3b796485b38bed27167091a3f40
-
SHA256
12c207df8450a308c439d6884a7f708508ea11284d1e11133e7c78cd1266f1f6
-
SHA512
96a7f8f92ed6b6a8e84f705ca77f51ed719c9f884980ba6d2e6d71c085cccb4be2d538e11d80ced5b342087bb49cc678bc5f8dd244c42f02be8f7a48249e623e
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+eK:LJ0TAz6Mte4A+aaZx8EnCGVue
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1640-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1640-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1640-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234dd-11.dat upx behavioral2/memory/1640-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1640-21-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a369c6004d5362c076bbfaa6a40ce120
SHA1270de897bda4107f2ecd75e3100ec2013e450b65
SHA2561c36342e11270821858869f130f4e1c0555631431da9ceb36d9edf006402b0df
SHA5122b3ecc90c6f0ff54cc9b48a6a57a796eb2ea02b4569a6d2339b7cfd0631685ef6bbc5b591011adf4519c0bc522b311fd6a3a802e2fffb805717d0a0d68668ea7