Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 02:52
Behavioral task
behavioral1
Sample
011eec88288215c37fc1c040e02ef0ae.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
011eec88288215c37fc1c040e02ef0ae.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
011eec88288215c37fc1c040e02ef0ae.exe
-
Size
202KB
-
MD5
011eec88288215c37fc1c040e02ef0ae
-
SHA1
479bbf44273cf7e79f132fbadc443826ced8ac0a
-
SHA256
dc354242f68bcd304ab72d5dfd1a8696c9474734da879f6e652b0a19cc160f64
-
SHA512
18711c86c1da6f1e53a1f50d8b8edece043a4571eabd25012c5ccca140b362a2a591fd3526c2bbc02e81a4edf0631a2458b5fb05ef9960d7c270783e16424e79
-
SSDEEP
6144:mCbitvA8lUcv6Jvr03OWAgCC7RSKDkoSh6H:mC+tvA8pv6e3OSCCFSKDkoSw
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2444-0-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/2444-1-0x0000000000400000-0x0000000000475000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2444 011eec88288215c37fc1c040e02ef0ae.exe 2444 011eec88288215c37fc1c040e02ef0ae.exe 2444 011eec88288215c37fc1c040e02ef0ae.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2444 011eec88288215c37fc1c040e02ef0ae.exe 2444 011eec88288215c37fc1c040e02ef0ae.exe 2444 011eec88288215c37fc1c040e02ef0ae.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2444 011eec88288215c37fc1c040e02ef0ae.exe