Analysis
-
max time kernel
7s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
CookieClickerHack.zip
Resource
win7-20230712-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
CookieClickerHack.zip
Resource
win10v2004-20230824-en
1 signatures
150 seconds
General
-
Target
CookieClickerHack.zip
-
Size
20KB
-
MD5
a7bcca47b5413eb92250a45f86d1ab75
-
SHA1
915ad4c18ae188da9ab338ced6862c4efb670091
-
SHA256
b7f82523253c3a1f18de5c649a96132820d89274cdf7a8c5cd3f47a79e76ed39
-
SHA512
4a666fe25bbaf41ff217a07bdd19fd9e2f57dba228511d9ae92d3ee75adaeb952fd91d4d4472e0c73babfb86806d54ddbe3d603ae124545b89ebdf570db19d87
-
SSDEEP
384:72qcAX5/Rmfcy2nbEL/m9iFnOBCBCV/OazL6k7DtAI:KAXhRsLQbELIisf/OC6k7DtAI
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{2300F70F-B7D5-4F3D-BD07-6CE21F0D2C1B}.catalogItem svchost.exe