Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:32
Behavioral task
behavioral1
Sample
6ec5c8b962988bf84bd203b2cbf24734.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6ec5c8b962988bf84bd203b2cbf24734.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
6ec5c8b962988bf84bd203b2cbf24734.exe
-
Size
4.2MB
-
MD5
6ec5c8b962988bf84bd203b2cbf24734
-
SHA1
ae064ca42656effaea911f1dd4da94b50aa7bc83
-
SHA256
b6d48666713c07eb391d9165720303f2d3904df3845b9cbf08f0f7a434953cd4
-
SHA512
fc42a28afa94b3ebc19c403533fd285f1d406775aeabbf0564bb3e0449e8e141e313e23ec5c1eeac1bd0435342e4706ba667f4727644872db8c7adb64bdb922e
-
SSDEEP
98304:KEB5hYqGIOzAIfW4rya7+/zqitNiN09x90NVFNI9+625G5XxKlf1:dJErWzLNeIx9MFNIs625G5XCf1
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x0000000000564000-memory.dmp upx behavioral1/memory/2292-18-0x0000000003E90000-0x0000000003EEB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2292 6ec5c8b962988bf84bd203b2cbf24734.exe