Analysis
-
max time kernel
163s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:43
Behavioral task
behavioral1
Sample
26c548b59a8a7c57d9a64d49731d075f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
26c548b59a8a7c57d9a64d49731d075f.exe
-
Size
141KB
-
MD5
26c548b59a8a7c57d9a64d49731d075f
-
SHA1
7f1027ac0f78d0c8a34615b5ba4fac1f704fdae1
-
SHA256
625c1aab69c2521fdb167dcdae7c43a5bf9cbb731ee1c0247165195ae2908592
-
SHA512
98f29374364cc7bd129b838bacc28a515510e05d67373d63bd5b86d529e60654046e990f6f74862d8b007830b424881d080de9f455ffd6939bd094c401bfb84e
-
SSDEEP
3072:gwT6fPoQv+NcZAaTcvSxPD+LelrIWLhb8abdm/CnDctE:gwEA7gAWcUdl9hf4/iDWE
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2848-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2848-2-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 26c548b59a8a7c57d9a64d49731d075f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2848 26c548b59a8a7c57d9a64d49731d075f.exe 2848 26c548b59a8a7c57d9a64d49731d075f.exe