Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:17
Behavioral task
behavioral1
Sample
0038cf4299a4543bd771bb6f5d93dc45.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0038cf4299a4543bd771bb6f5d93dc45.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
0038cf4299a4543bd771bb6f5d93dc45.exe
-
Size
11KB
-
MD5
0038cf4299a4543bd771bb6f5d93dc45
-
SHA1
4fd1c814dac543f3ff6904a034ed332b22417b1b
-
SHA256
15adf2383fcf1034e6a0bbf322edb991ab38a5a17c2aed3a36056a0a24dea8d4
-
SHA512
b86cd6e4aff5528fb7565500b30b16dc81824119ac7f9d68f4e3310d94c1515c81faa2332bb9363c1679e11b41bcd1d1f992b7e28c518d243bac4002eee41a5c
-
SSDEEP
192:UEcUk0Z0bl4tEfJPBBQMdW057vSPxLwB+bOtW:UEQ0+R4y6SWu7a5LtyW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4072-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/4072-3-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4072 0038cf4299a4543bd771bb6f5d93dc45.exe 4072 0038cf4299a4543bd771bb6f5d93dc45.exe 4072 0038cf4299a4543bd771bb6f5d93dc45.exe 4072 0038cf4299a4543bd771bb6f5d93dc45.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4072 0038cf4299a4543bd771bb6f5d93dc45.exe