Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:48
Behavioral task
behavioral1
Sample
128eec3cbeccc5c6838ac2d95c82a73a.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
128eec3cbeccc5c6838ac2d95c82a73a.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
128eec3cbeccc5c6838ac2d95c82a73a.exe
-
Size
951KB
-
MD5
128eec3cbeccc5c6838ac2d95c82a73a
-
SHA1
a58733c9dc96abb6a63c619cfd2cab3e9a193bf1
-
SHA256
35c0e1b47d5208583c64aeacfbaf515c7df8e325b8c4d98309b4dd067a586d41
-
SHA512
fda7c3d1b9a64e3d5f4893982d761213a0d4c1fc593f0f810102f19f21f7d9155613a463cc8327180223ebbfeac6bdd44cef5c5a55bb3406dd4c925a5fea0de3
-
SSDEEP
24576:iKyQdvf6sPekIJbUYNVxNpnKiQhEk5UEIqT3mz1ilI9:DLd6oorpUr5UnC3mh9
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5688-0-0x0000000000400000-0x00000000006EB000-memory.dmp upx behavioral2/memory/5688-2-0x0000000000400000-0x00000000006EB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 128eec3cbeccc5c6838ac2d95c82a73a.exe