Analysis
-
max time kernel
145s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 01:16
Behavioral task
behavioral1
Sample
1fd17abb1a0e8eff6031a5140870c155.exe
Resource
win7-20231215-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
1fd17abb1a0e8eff6031a5140870c155.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
1fd17abb1a0e8eff6031a5140870c155.exe
-
Size
928KB
-
MD5
1fd17abb1a0e8eff6031a5140870c155
-
SHA1
1e4dce9c3d6db3616e0a757524387ec5d7d6b608
-
SHA256
a217823069ebb747fd86e5e4d4a2d41b27ffc6d48fdfbd04dd3ba550f26fb7d6
-
SHA512
5370244df83c3865d371cf5bfbc455c32c27fd3735068650e11969ec71b6f992d2a4c179a025200976bf815e57c4fbcef6e882711e4b835d628738e82772e2c0
-
SSDEEP
24576:ih63DSP3ZP/jXRKT3h3pcWE4fq5iq/cPGvH36mxFL73sxwmQLNozu0MkWtoYfR:J65jXRKT3PctRPX36mjL7cCtyN/bY
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1796-0-0x0000000001000000-0x0000000001575000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\1fd17abb1a0e8eff6031a5140870c155 = "\"C:\\Users\\Admin\\AppData\\Local\\838116651.exe\" 0 43 " 1fd17abb1a0e8eff6031a5140870c155.exe