Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
20bfc174e111b708ceef9d93a242d5c0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20bfc174e111b708ceef9d93a242d5c0.exe
Resource
win10v2004-20231215-en
General
-
Target
20bfc174e111b708ceef9d93a242d5c0.exe
-
Size
204KB
-
MD5
20bfc174e111b708ceef9d93a242d5c0
-
SHA1
3ca8d1ae3f617d068d1d99b1bf2ee3afeed3cbb9
-
SHA256
9ab830eb59b3587a5e523aaa4dae0ed0a5fe46e092230e9efa90ab30608ad493
-
SHA512
70ba12c4e469f6ebaf70c9d6570900ca7f091f615cf4694a012290cd3ff2868ce3201f6c7266376699744359921c524b99c04f2072dbf5224823384de2a7af37
-
SSDEEP
3072:V8E/tFYqp+fUs23BRNDlXJu8c68TGVYqp+fUs23BRNDlXJu8c68THtv+8:V8atFzofUs23BRPzofUs23BRUtm8
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\explore.exe 20bfc174e111b708ceef9d93a242d5c0.exe File created C:\WINDOWS\SysWOW64\orkut.exe 20bfc174e111b708ceef9d93a242d5c0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2092 20bfc174e111b708ceef9d93a242d5c0.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M61DDFBK\orkutkt[1].htm
Filesize1KB
MD50b1cd114b167a6c0cd7d896ee0fc0233
SHA105d94767c1502e39461cb33b2888a0d8163684f7
SHA256a67219b74655e4fa4cc0afe9b039133647dee6a0ead0436b18c4b19d8a5a9f5c
SHA512e7ef02fd69e370457071201e74b859ff5702e36382660a1cc5b20f34674a29d76d0e2be478cd248105b03f522e1ec8fa847b022074e81518ed9bbf91b74cbb6d