Analysis
-
max time kernel
171s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 12:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6e41bc2a4005670077cf6aeb56101e97.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6e41bc2a4005670077cf6aeb56101e97.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
6e41bc2a4005670077cf6aeb56101e97.exe
-
Size
762KB
-
MD5
6e41bc2a4005670077cf6aeb56101e97
-
SHA1
f27b7dfdf5ca15c5ff4cc79cda5e7c0d6c58b0e1
-
SHA256
b690bc1964ae93d5acac84571af0609321b3be4b94ddd50934622e268fc28bb8
-
SHA512
0e710d7dfc65c9fc432e8a147869ccd517fc7258c54f7076cf13630dc71fe8bb72c231c96f181cd6e02e6d1f699cf603e9b0071c1519ce228b9154e0431c43ec
-
SSDEEP
12288:A+Vk02gPparxwgOEz0TOJTKmaWvGbGgdPwoXx1WMt8:Awk0VPpatOC0TOJTFfvz2PwoXXz+
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\wc98pp.dll 6e41bc2a4005670077cf6aeb56101e97.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\ic32pp 6e41bc2a4005670077cf6aeb56101e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\ic32pp\CLSID = "{BBCA9F81-8F4F-11D2-90FF-0080C83D3571}" 6e41bc2a4005670077cf6aeb56101e97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BBCA9F81-8F4F-11D2-90FF-0080C83D3571} 6e41bc2a4005670077cf6aeb56101e97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BBCA9F81-8F4F-11D2-90FF-0080C83D3571}\InprocServer32 6e41bc2a4005670077cf6aeb56101e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BBCA9F81-8F4F-11D2-90FF-0080C83D3571}\InprocServer32\ = "C:\\Windows\\wc98pp.dll" 6e41bc2a4005670077cf6aeb56101e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BBCA9F81-8F4F-11D2-90FF-0080C83D3571}\InprocServer32\ThreadingModel = "Apartment" 6e41bc2a4005670077cf6aeb56101e97.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4320 6e41bc2a4005670077cf6aeb56101e97.exe 4320 6e41bc2a4005670077cf6aeb56101e97.exe