Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:58
Behavioral task
behavioral1
Sample
1dcd050e1763669553acd3b13b9bd23c.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1dcd050e1763669553acd3b13b9bd23c.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1dcd050e1763669553acd3b13b9bd23c.exe
-
Size
628KB
-
MD5
1dcd050e1763669553acd3b13b9bd23c
-
SHA1
2d765605dd26c472c1dd1d580449b9dfb36c4a4d
-
SHA256
6a020cb61cc2ae15613adaec0b3bc2e8ea55dab20767b8eaa67d4ad5ed2edf02
-
SHA512
511a1c08350ee3b8c248a45590295e04cc4f3d543888cb2396b23112bb7ba000640c0e2c90f02b488e9119dfc0bee78b98bcf2ac7282e2dcdb161aaf753c18cd
-
SSDEEP
12288:8TUGk5UvWSukfZN+GEgrvJeBbeOc6lk5U7hPwZ0BZgzOCTgBymdKh:8wGk5ODP4jgrkBbeOc6lk5U7NZkzTKU
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2216-0-0x0000000000400000-0x000000000070D000-memory.dmp upx behavioral1/memory/2216-3-0x0000000000400000-0x000000000070D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 1dcd050e1763669553acd3b13b9bd23c.exe