Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:43
Behavioral task
behavioral1
Sample
26c548b59a8a7c57d9a64d49731d075f.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
26c548b59a8a7c57d9a64d49731d075f.exe
-
Size
141KB
-
MD5
26c548b59a8a7c57d9a64d49731d075f
-
SHA1
7f1027ac0f78d0c8a34615b5ba4fac1f704fdae1
-
SHA256
625c1aab69c2521fdb167dcdae7c43a5bf9cbb731ee1c0247165195ae2908592
-
SHA512
98f29374364cc7bd129b838bacc28a515510e05d67373d63bd5b86d529e60654046e990f6f74862d8b007830b424881d080de9f455ffd6939bd094c401bfb84e
-
SSDEEP
3072:gwT6fPoQv+NcZAaTcvSxPD+LelrIWLhb8abdm/CnDctE:gwEA7gAWcUdl9hf4/iDWE
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4612-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4612-2-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 26c548b59a8a7c57d9a64d49731d075f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4612 26c548b59a8a7c57d9a64d49731d075f.exe 4612 26c548b59a8a7c57d9a64d49731d075f.exe 4612 26c548b59a8a7c57d9a64d49731d075f.exe 4612 26c548b59a8a7c57d9a64d49731d075f.exe