Analysis
-
max time kernel
160s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:09
Behavioral task
behavioral1
Sample
048b2377f4def9cda7aeea0061248963.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
048b2377f4def9cda7aeea0061248963.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
048b2377f4def9cda7aeea0061248963.exe
-
Size
202KB
-
MD5
048b2377f4def9cda7aeea0061248963
-
SHA1
f6fcc33cdc97c89e0bb54390e289cf777eed97d4
-
SHA256
e0750fd268903688d811a59b0f9c7286588c7e767dbe40e1330d47c708699853
-
SHA512
9181848e76a8f978afc3c5ced2decc8fc99c1ad477f34f126c2072d5a168c00778392e0a85776503e1718fc0d62404c73bcdcd1b128703fa09cf8ee21f257a21
-
SSDEEP
6144:OZC4d3lbxc6wU/UP+XhdMRFD3LAwektHoSAv:34dMRU/UP4heFjLDFtHoSc
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1744-0-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1744-1-0x0000000000400000-0x0000000000474000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1744 048b2377f4def9cda7aeea0061248963.exe 1744 048b2377f4def9cda7aeea0061248963.exe 1744 048b2377f4def9cda7aeea0061248963.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1744 048b2377f4def9cda7aeea0061248963.exe 1744 048b2377f4def9cda7aeea0061248963.exe 1744 048b2377f4def9cda7aeea0061248963.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1744 048b2377f4def9cda7aeea0061248963.exe