Analysis
-
max time kernel
7s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:08
Behavioral task
behavioral1
Sample
4f00441d553136addbe46c4e8f1d2860.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f00441d553136addbe46c4e8f1d2860.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4f00441d553136addbe46c4e8f1d2860.exe
-
Size
133KB
-
MD5
4f00441d553136addbe46c4e8f1d2860
-
SHA1
efd4e2f1c5ac6c6fd98cd6915b3c88faee79cfaf
-
SHA256
dc8880c660e718d12c5df2819f598575cea08a8b34dca70cf6105743ee075715
-
SHA512
fe7845475574f5c7c9e60d3395ab7fa06a20f45f3a0cad5ab6b366e6cc6349cc2db06d3defd0fca766a87b6f8a387a323a128e7be7bd532304796a660bfc5f59
-
SSDEEP
3072:3YaAMtTy3tKlMWa4kmW6i2nzHxWPkLJ+ia8ppR7:ZAiM54k/6fxWWJ9aY
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1716-0-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job 4f00441d553136addbe46c4e8f1d2860.exe File opened for modification C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job 4f00441d553136addbe46c4e8f1d2860.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 4f00441d553136addbe46c4e8f1d2860.exe