Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 22:59
Behavioral task
behavioral1
Sample
49dcfc7035c08209597d84b96d4eda127bfbafa8e02eb3c0379f6201c328da35.exe
Resource
win7-20220901-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
49dcfc7035c08209597d84b96d4eda127bfbafa8e02eb3c0379f6201c328da35.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
49dcfc7035c08209597d84b96d4eda127bfbafa8e02eb3c0379f6201c328da35.exe
-
Size
22KB
-
MD5
a2309b93e92eb5ca0f73ea2dd6491335
-
SHA1
5b69decff1ee62168f9f70169a0bb1e5ddbc247a
-
SHA256
49dcfc7035c08209597d84b96d4eda127bfbafa8e02eb3c0379f6201c328da35
-
SHA512
5bef97b9aa710c74a43a0018f9c30d93a7f44cbf93e8669ecb3cea7d23bfe10cc99221208dc317760eddd56ed09ec5bf292f03135baa0d544ee62c49a31615b5
-
SSDEEP
384:z6EWMBiaYjwwrI7ofsrj4ikRa/NfGuJUQ6PeQ7IX4zo16QKKSO:zvWwiaYjZE7ssrHcQAOn6WmIX4o6n3
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1284-55-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1284-56-0x0000000000400000-0x0000000000412000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\PIC 49dcfc7035c08209597d84b96d4eda127bfbafa8e02eb3c0379f6201c328da35.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\PIC\MID = "bb206c0004050000e3a15165" 49dcfc7035c08209597d84b96d4eda127bfbafa8e02eb3c0379f6201c328da35.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\PIC\MID2 = "49dcfc7035c08209597d84b96d4eda127bfbafa8e02eb3c0379f6201c328da35.exe" 49dcfc7035c08209597d84b96d4eda127bfbafa8e02eb3c0379f6201c328da35.exe