Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b7dce37925c85e9902b3b3397557f03.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b7dce37925c85e9902b3b3397557f03.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
0b7dce37925c85e9902b3b3397557f03.exe
-
Size
382KB
-
MD5
0b7dce37925c85e9902b3b3397557f03
-
SHA1
8d9601dad86b4f623947740377723e86cb030089
-
SHA256
e0b606b611864924684aece902b8244f8fc03e6ec976068c7fba72c13d967693
-
SHA512
1eafc21bc27ca4543a07d34e3f34764af6882ec31906140021e81951c06c0407cc94b15abe37c019a807cf64a86a154498dd852202639effb726f318afd66d18
-
SSDEEP
6144:vHoiNWQHJG+rQJgE7ndm9VA2l2p4vGIG/gdfijiCpLMMdZQr4:wi8QWdmzJ2WGHFpLMMA4
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\progra~1\Outlook Express\msimn.exe 0b7dce37925c85e9902b3b3397557f03.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4320 0b7dce37925c85e9902b3b3397557f03.exe 4320 0b7dce37925c85e9902b3b3397557f03.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4320 0b7dce37925c85e9902b3b3397557f03.exe 4320 0b7dce37925c85e9902b3b3397557f03.exe