Analysis
-
max time kernel
156s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:49
Behavioral task
behavioral1
Sample
0f0da364f7c4edc0b12d62420c56336c.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f0da364f7c4edc0b12d62420c56336c.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
0f0da364f7c4edc0b12d62420c56336c.exe
-
Size
355KB
-
MD5
0f0da364f7c4edc0b12d62420c56336c
-
SHA1
61cd92b26d37b73a8c20866625af8215a31562ce
-
SHA256
b093304645d1d0ed82d427067677c38520bd93ebf7df227a281ea691bae4f55f
-
SHA512
13ca1cd7a9d5dd8a6a3f2bb40d9b5c0bc1903665bc548c0af6e42608976be2671baac1e2d9eea17f032178f778a0a6010f520e16a7fa24aef9d34ae6796423fc
-
SSDEEP
6144:7Qw0WAtKvhICR0U6C6XxfmVD4VQy2/qBDZ3+C/CjqMrcG8C1Ncys5:0w0WAtKZPeRONp2Z3+eXCMZ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3824-0-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral2/memory/3824-2-0x0000000000400000-0x00000000004DB000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3824 0f0da364f7c4edc0b12d62420c56336c.exe 3824 0f0da364f7c4edc0b12d62420c56336c.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3824 0f0da364f7c4edc0b12d62420c56336c.exe 3824 0f0da364f7c4edc0b12d62420c56336c.exe