Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:46
Behavioral task
behavioral1
Sample
1ee42c841ffff2e461ae0d7187568ac5.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ee42c841ffff2e461ae0d7187568ac5.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
1ee42c841ffff2e461ae0d7187568ac5.exe
-
Size
197KB
-
MD5
1ee42c841ffff2e461ae0d7187568ac5
-
SHA1
05af5b49afdd02860a5248dd2d0a97d37588cf1d
-
SHA256
9966888132e72aa17c6b08d44b76afd5dfd0bb661008f709b2fb45cc8f6a312d
-
SHA512
53420fb7131acae162a8a54fefcb644cc85569833052d437846ab003575cdfd28e3590e8019d84b0028ae07bf31cb0bc7e4d6dfa82b835d6a10db20eeb1d1e3c
-
SSDEEP
3072:9LupZfs4pTU6wezvBeZLuvKSAGhb7qWgCnbk4JSsWzQ97ULI:9Lujfke9eZ6jMWgu4WhWzQ1/
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2128-0-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-10-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-11-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-12-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-13-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-14-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-15-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-16-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-17-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-18-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-19-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-20-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-21-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-22-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-23-0x0000000000400000-0x0000000000642000-memory.dmp upx behavioral1/memory/2128-24-0x0000000000400000-0x0000000000642000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main 1ee42c841ffff2e461ae0d7187568ac5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2128 1ee42c841ffff2e461ae0d7187568ac5.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2128 1ee42c841ffff2e461ae0d7187568ac5.exe 2128 1ee42c841ffff2e461ae0d7187568ac5.exe 2128 1ee42c841ffff2e461ae0d7187568ac5.exe 2128 1ee42c841ffff2e461ae0d7187568ac5.exe