Analysis
-
max time kernel
152s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 22:00
Behavioral task
behavioral1
Sample
143ce7a014aba76a56ec1d0850cfa1ec.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
143ce7a014aba76a56ec1d0850cfa1ec.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
143ce7a014aba76a56ec1d0850cfa1ec.exe
-
Size
355KB
-
MD5
143ce7a014aba76a56ec1d0850cfa1ec
-
SHA1
c44fe93026a8e44630f6347d1945a552c7b96720
-
SHA256
42bbd9c36db2afa3f8807ebece64446446d86e411daaa959357e89a8f2490dac
-
SHA512
bb35f1d086b17974e0905cacaea92007875de7011f6d5a3c5e0b09b578f8b62ecb9faeee14f3138041baab22f4c2b9183dd473440741c357b02065411b6d8c22
-
SSDEEP
6144:EQg6R6F9j4z7WHf09RbMOs02+NfOV9ddrFm6UvjaEo+8NfWxU5I1nqSZK3LR:Jg6ZzS89qODdG9ddrILrCfWxwl3LR
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2968-0-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral1/memory/2968-2-0x0000000000400000-0x00000000004DB000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2968 143ce7a014aba76a56ec1d0850cfa1ec.exe 2968 143ce7a014aba76a56ec1d0850cfa1ec.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2968 143ce7a014aba76a56ec1d0850cfa1ec.exe 2968 143ce7a014aba76a56ec1d0850cfa1ec.exe