Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24-11-2023 10:00
Behavioral task
behavioral1
Sample
BulkFileChanger.chm
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
BulkFileChanger.chm
Resource
win10v2004-20231025-en
Behavioral task
behavioral3
Sample
BulkFileChanger.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
BulkFileChanger.exe
Resource
win10v2004-20231023-en
General
-
Target
BulkFileChanger.chm
-
Size
65KB
-
MD5
7c9b2e70d38a336d15ac544d5dba1de6
-
SHA1
49fcad8863d1b64daa005977235bee9edc871af1
-
SHA256
9cf91989a981e923ffc61d05e233d7787680708cdd707bd0d7d4d41e76e2d1b9
-
SHA512
826f7eb501b86bcbb4c8310896a50357ff8a7575c703c3c69cbc79d0e1f68631ecd6d15c55b376a2f5311d79f6d17f7cf1412e1e71fec0b2aefaee7986655ae2
-
SSDEEP
1536:NGUesMfURS6hWZ/UQQw0LF31TrUQ4zkfuwanx0xIzD:cUM1X/Yl1x4wfuBnGE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main hh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2096 hh.exe 2096 hh.exe