Analysis
-
max time kernel
1s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 07:18
Behavioral task
behavioral1
Sample
5c05ceeebc3f5ebacf248f4c67aa68cc.exe
Resource
win7-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
5c05ceeebc3f5ebacf248f4c67aa68cc.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
5c05ceeebc3f5ebacf248f4c67aa68cc.exe
-
Size
575KB
-
MD5
5c05ceeebc3f5ebacf248f4c67aa68cc
-
SHA1
09d75ec9cb65053900e199bff3ecb86616fb2ae3
-
SHA256
39b8472833aed1ddf58c028b20bc7e6ad21303f3c261a71bc1a10d130961a8f1
-
SHA512
1dfbfeb667d6d20b73186341318f7f1996c297c888d7ce3ca2c01fa07d85b06a2460db44a028af4aba6aa2c804abb47af763cb3f25077c46c9621d30a7d5ecb1
-
SSDEEP
12288:cFCWv8lNxsePRFugBXqSsGlCt7rg0lbI4bdIXa5bgxddpW0IjMq6HT:mCWkPFPjnBBsmCt7rgks4aXegxY0Ijuz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1640-0-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-2-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-1-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-142-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-143-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-145-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-144-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-147-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-148-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-149-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-151-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-152-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-153-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-154-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-155-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-156-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-157-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-158-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral2/memory/1640-159-0x0000000000400000-0x000000000051E000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240602015.log 5c05ceeebc3f5ebacf248f4c67aa68cc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1640 5c05ceeebc3f5ebacf248f4c67aa68cc.exe 1640 5c05ceeebc3f5ebacf248f4c67aa68cc.exe