Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 16:37
Behavioral task
behavioral1
Sample
win.exe
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
win.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
win.exe
-
Size
5.7MB
-
MD5
e42a8e96e08ce2e22fade2309798e4ad
-
SHA1
2d8fe944dba6631211a694408a6de9e12be05b5b
-
SHA256
9dbe2bff2ff6fdc92da92b98e8cf067df5a21ce0f351a47c2ccc190d590ba2dc
-
SHA512
39e0b2c0b6762026843ab244a2a6d54d558d56a941ce3f68a84e6390719f721473da977564922d694533d7b7b4fd86f0b2b423a3cfcef4c804d2e5f51fce220c
-
SSDEEP
98304:RxGruILthS1y28otHB7fpJKbM89c87LGwPXIm6PDokA7+Iqtdd8Spaz:RQaIUy3kB7vKb19l7zPv6MYIqHddp
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2372-0-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-1-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-3-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-4-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-8-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-9-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-11-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-12-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-14-0x00000000009A0000-0x00000000019C6000-memory.dmp upx behavioral1/memory/2372-15-0x00000000009A0000-0x00000000019C6000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
win.exepid process 2372 win.exe 2372 win.exe