Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 16:08
Behavioral task
behavioral1
Sample
7b78dd118bb6653763485a4b0e25f854.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7b78dd118bb6653763485a4b0e25f854.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7b78dd118bb6653763485a4b0e25f854.exe
-
Size
643KB
-
MD5
7b78dd118bb6653763485a4b0e25f854
-
SHA1
ec38e083c1d3af61559f29eccba79fc08d45ff12
-
SHA256
22d6edce6ccc33768cfa0da99a236ff16ef1dc774257c2a8bf9f046016c0aa48
-
SHA512
219914f08655bf579890fe2d699d1c889656dc07229e6a66efcec4636975e8268dfd2fc11325e991b67a0daf014ab61b66e314be9b5fe3be9b3c278cfae0b0e7
-
SSDEEP
12288:nEHHOxKPI1voSvJC1WbJZ+eOk+PolnBuyps49Uc4js6OTI3N7oN1b/h:nEHH9I/JTJ4eVnBbOs6kI3N7oPbh
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4668-0-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4668-19-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IT 7b78dd118bb6653763485a4b0e25f854.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IT\ = "9B4762643414BF2C" 7b78dd118bb6653763485a4b0e25f854.exe