Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 17:37
Behavioral task
behavioral1
Sample
25116565d83b4a623c67ab9c08e059460c5440037b690da20da7de32f1f34be3.exe
Resource
win7-20240704-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
25116565d83b4a623c67ab9c08e059460c5440037b690da20da7de32f1f34be3.exe
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
25116565d83b4a623c67ab9c08e059460c5440037b690da20da7de32f1f34be3.exe
-
Size
1.1MB
-
MD5
e9a387c74e0fdc9b1a054593481f61c9
-
SHA1
5cbe797d38b3c5d201d14aab4308b82dd47cc1db
-
SHA256
25116565d83b4a623c67ab9c08e059460c5440037b690da20da7de32f1f34be3
-
SHA512
682c99e612dfd3b25bdee3eb99c6879fcbca7912e4cef102cd8742727744263b4d99307df5066e1a7952b66ee0081ee9a2dbdd682901eb5df1c384320140fbcd
-
SSDEEP
24576:RWVDnbaBo9eRtK93XBybwGAPEE6eMaywbfws2+jn8E3bjaXCymC:RWtu+4RtyRysbn6eMaywEzkr+X1f
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2808-0-0x00007FF6690F0000-0x00007FF6692B1000-memory.dmp upx behavioral2/memory/2808-2-0x00007FF6690F0000-0x00007FF6692B1000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2808 25116565d83b4a623c67ab9c08e059460c5440037b690da20da7de32f1f34be3.exe