Analysis
-
max time kernel
138s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 18:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3482499171a47cd68bcfeb20fb1448eb.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
3482499171a47cd68bcfeb20fb1448eb.exe
-
Size
882KB
-
MD5
3482499171a47cd68bcfeb20fb1448eb
-
SHA1
881475258b48dcef28cc049a9b1f0ee090bf89e3
-
SHA256
eaa971069fad8bf8747145de1cbee27af71c4799ffaa7c2fb30fe94e46e9432a
-
SHA512
cd7a0f75f60c2be6519bc8cc502c65388e8f2719cd5e55cd8011c2bd7658e3d6ae127b4e64b58053b191869707201e0038b4dae304385b8cd72860b8f3ca24d6
-
SSDEEP
24576:0Xy9tzKUd58mZ8zl3Msy96dMJyi8hnHQP4JPkVieut:ZzKA0lcNYiiH/JDt
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3482499171a47cd68bcfeb20fb1448eb.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4120 3482499171a47cd68bcfeb20fb1448eb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4120 3482499171a47cd68bcfeb20fb1448eb.exe 4120 3482499171a47cd68bcfeb20fb1448eb.exe