Analysis
-
max time kernel
164s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:24
Behavioral task
behavioral1
Sample
16f6a53a770051a4d21ca2d5da04a478.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
16f6a53a770051a4d21ca2d5da04a478.exe
-
Size
1.4MB
-
MD5
16f6a53a770051a4d21ca2d5da04a478
-
SHA1
acba1f1daaa0dbfdf73a0add26a020e5b7f8efbf
-
SHA256
05bf51e3e012ce562b74ca3363208f9363652fa2fd6c34e456b7320cb8748a9c
-
SHA512
749d7592a99994c51fbfab8aafb558343d912aca75c12692eb502c6b4bc20cd5dd3a88c273b62075b0b26529bc608f0d2ed5d58c84d554d25df3bd62689c04e5
-
SSDEEP
24576:8NBalckrFirk3Kol0U4aGV9kYZLPS/oDodgWvnxz53nEWLp3r3d:8NklckWkZZ4pk8tyVxzpEWd3rt
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3732-0-0x0000000000400000-0x00000000007EB000-memory.dmp upx behavioral2/memory/3732-2-0x0000000000400000-0x00000000007EB000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3732 16f6a53a770051a4d21ca2d5da04a478.exe 3732 16f6a53a770051a4d21ca2d5da04a478.exe