Analysis
-
max time kernel
149s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:14
Behavioral task
behavioral1
Sample
78491404565e41415f5c0f71dc4f7bc5.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
78491404565e41415f5c0f71dc4f7bc5.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
78491404565e41415f5c0f71dc4f7bc5.exe
-
Size
366KB
-
MD5
78491404565e41415f5c0f71dc4f7bc5
-
SHA1
dcecc4cb9829fe1bac9ad342163e16a2fb632195
-
SHA256
125eec4fb37b7f07006d76fb3c0a7532277ae88b1df4942231d6de09c49a2a4f
-
SHA512
bf7e6e8a809818d3b664593688d32009e052a1a4a5ab848e5ef1997b4c505d63047ca15919522895b7d5f65a205514ed0d98c4ec1e0e0d644ef9397de497320c
-
SSDEEP
6144:k1dCFHNTlimVL8t9xPLMarcYAJv0NMiYtwJrtq:kaFHVzVyYar760KmrM
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2532-0-0x0000000000AF0000-0x0000000000BD7000-memory.dmp upx behavioral2/memory/2532-1-0x0000000000AF0000-0x0000000000BD7000-memory.dmp upx behavioral2/memory/2532-2-0x0000000000AF0000-0x0000000000BD7000-memory.dmp upx behavioral2/memory/2532-4-0x0000000000AF0000-0x0000000000BD7000-memory.dmp upx behavioral2/memory/2532-6-0x0000000000AF0000-0x0000000000BD7000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\78491404565e41415f5c0f71dc4f7bc5.exe = "0" 78491404565e41415f5c0f71dc4f7bc5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2532 78491404565e41415f5c0f71dc4f7bc5.exe 2532 78491404565e41415f5c0f71dc4f7bc5.exe