Analysis
-
max time kernel
172s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
7e31744c580d80a9ed3342fce87400b5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e31744c580d80a9ed3342fce87400b5.exe
Resource
win10v2004-20231215-en
General
-
Target
7e31744c580d80a9ed3342fce87400b5.exe
-
Size
264KB
-
MD5
7e31744c580d80a9ed3342fce87400b5
-
SHA1
55f3e84ba6f0003beb75fa7b8d2fa7c86a213749
-
SHA256
e93333a2697f0275b1da38060d22cb1265ac7fd8a1cbba003008b21d30967176
-
SHA512
f484dd9d1e1ffab9efb9f253ee2bf27dea434581720e3772e67e181569770689846f9b28244ae7a2291a3e3daa254d97fa50427eb1363487076c047eed2a877c
-
SSDEEP
6144:ZMXuT0D8oIQMCdlVf5NxtnHLwY7vqxdxt:Z6uTwRf5/Kxv
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\autorun.exe 7e31744c580d80a9ed3342fce87400b5.exe File opened for modification C:\Windows\SysWOW64\autorun.vbs 7e31744c580d80a9ed3342fce87400b5.exe File opened for modification C:\Windows\SysWOW64\autorun.bin 7e31744c580d80a9ed3342fce87400b5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 900 7e31744c580d80a9ed3342fce87400b5.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550B
MD521541f65a6a134372e20d10c535e3ef8
SHA1c3899ac5c290d07563310fb2c52ee2fb33c5c2a1
SHA256df3f793809b986a0f711efdcb958b01e1b5d665716603dd4d7ee430216ea8310
SHA512353cbf773885047113a23d1a615fe88bbe0fc0ff00f03555f25372d5c80e929501fabee86781da62a94255e1b100135f12b9f7ca100f87584de87139d46c5235