Analysis
-
max time kernel
171s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:52
Behavioral task
behavioral1
Sample
0abd81c0d8f12faa5688244d52a8e960.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0abd81c0d8f12faa5688244d52a8e960.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0abd81c0d8f12faa5688244d52a8e960.exe
-
Size
294KB
-
MD5
0abd81c0d8f12faa5688244d52a8e960
-
SHA1
d24405d19aafb633f78b7d7d3e2a8e25e0b13af4
-
SHA256
6d61df8ba007b0a633445e51528dbaf0433f0b7319cda6368bb6d1b553f32099
-
SHA512
94f817d6faca1210487f1f7f51d1196686f164a0bbae8a07def7551beb8df8db282d9e4de6064edf2e7f22d0036b06b95e7d41b4bc1b56ca0f419d54c664528e
-
SSDEEP
6144:4gCJwHef48sgtN5U0VE6VtCVnECdtFamEdVj+lLKS3mUnSX9b:QRltN5U0VbXCVnEhq3m9b
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2784-0-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-1-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-3-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-4-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-5-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-6-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-7-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-8-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-9-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-10-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-11-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-12-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-13-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-14-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral2/memory/2784-15-0x0000000000400000-0x00000000004CA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\addendum = "C:\\Program Files (x86)\\addendum\\sidebar\\gamjoa\\addendume.exe" 0abd81c0d8f12faa5688244d52a8e960.exe