Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 01:53
Behavioral task
behavioral1
Sample
edbfdd04d154060b82f386191ba772e0b9122e2f82a4e3c0e3ddf65fc7a8b55a.exe
Resource
win7-20240419-en
2 signatures
150 seconds
General
-
Target
edbfdd04d154060b82f386191ba772e0b9122e2f82a4e3c0e3ddf65fc7a8b55a.exe
-
Size
24.4MB
-
MD5
16b332205d167a6a6f76c5293aa8f201
-
SHA1
40c0fba9107d270cf006f58f4fecc9742f806a2b
-
SHA256
edbfdd04d154060b82f386191ba772e0b9122e2f82a4e3c0e3ddf65fc7a8b55a
-
SHA512
ff18c351f1f86134f79a535eb5f6045c5dfdf3ab9e632d15a5266c86e25c0cd675a88f457a99f3ae6a92d0929d35f703a366b0d11fac1ffaa09e6f44f39e11f5
-
SSDEEP
393216:Z8V2nhTIrvYzEWmn+FBhwFDbllTqkl6eFh3zZNgni9HkHxHLCA9arP1A0+3ERPWy:OV2h2QzE0FTIpt6eFl1NykmxeS3u
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2368-0-0x000000013FAA0000-0x0000000143B52000-memory.dmp UPX behavioral1/memory/2368-1-0x000000013FAA0000-0x0000000143B52000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/2368-0-0x000000013FAA0000-0x0000000143B52000-memory.dmp upx behavioral1/memory/2368-1-0x000000013FAA0000-0x0000000143B52000-memory.dmp upx