Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 21:37
Behavioral task
behavioral1
Sample
049b784efab2538dcce5515714921f83.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
049b784efab2538dcce5515714921f83.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
049b784efab2538dcce5515714921f83.exe
-
Size
2.1MB
-
MD5
049b784efab2538dcce5515714921f83
-
SHA1
c60b9d6eb07ece2958c9715be57c0feb4feb4ae1
-
SHA256
d66eab298b4dfeb5399eaf49a97b5479c8838ac5fe0ae8d8b56b4aa9c9c52ca5
-
SHA512
d60f6782b798aff19ebee8ee0fac2df22866eb975ef697369dc4b2facb6d77fc267eeaf91b3b70c877602af040301811165510a63f59b7eae159e7c88d6e9b43
-
SSDEEP
49152:idxYWWyYc7EwqjQlSKzf5fl/vGotwxEFVS0aSaKMOo:i+W7nejG5fl/Btwqj0Sat
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2980-0-0x0000000001000000-0x0000000001457000-memory.dmp upx behavioral2/memory/2980-1-0x0000000001000000-0x0000000001457000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe 2980 049b784efab2538dcce5515714921f83.exe