Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 23:57
Behavioral task
behavioral1
Sample
Fighter FX 8.0/FighterFX.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Fighter FX 8.0/FighterFX.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Fighter FX 8.0/FighterFX.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Fighter FX 8.0/FighterFX.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Fighter FX 8.0/Status Checker.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Fighter FX 8.0/Status Checker.exe
Resource
win10v2004-20231215-en
General
-
Target
Fighter FX 8.0/Status Checker.exe
-
Size
54KB
-
MD5
c308f8db3c8eaa113396b94d3d5186dd
-
SHA1
e1973791abb8a760f8e09f0072ea395019ec0a20
-
SHA256
f7c7856b619af0abf32a166484bbd2daf9ee0b6f0f93b5f1f3496afeb7484f62
-
SHA512
c29b9258a8d53680c8eef3d1f9736a2c16bd630a89b70bc3c9e17484ac77ebe0adf1dd8264a9fc65e46d288ae4051f822240b86f0efa236c213683109276c3ec
-
SSDEEP
1536:W7k3LCsEEr9TLxcPDEcP8y8LP59tumkFP:F3+sNVyf8LB9tgZ
Malware Config
Signatures
-
resource yara_rule behavioral5/memory/1728-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral5/memory/1728-9-0x0000000000400000-0x0000000000424000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main Status Checker.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1728 Status Checker.exe 1728 Status Checker.exe