Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 12:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
36ad2bfc5bb7814a93a701a98d252730.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
36ad2bfc5bb7814a93a701a98d252730.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
36ad2bfc5bb7814a93a701a98d252730.exe
-
Size
24KB
-
MD5
36ad2bfc5bb7814a93a701a98d252730
-
SHA1
260d8055f06e21ee747be575678ab571b85d8681
-
SHA256
61d16d05e87ec5719a1234b29f296bb03f032408dc83dc06fc3fedca0fc42c5c
-
SHA512
cbda58aeb5b1d25bd9b183a8bb13ad4f48b4fb7b2d00422048b2061db070cb671f4ca363907ef84ef3f7c54880a8f583bbd7f9669f72a66961471429c8f3c9ee
-
SSDEEP
384:dLAOpuRskNVmYn8hIRaQo2ZRAqkkKw2eh8OVghYWgJ3V+3Oj+dzEMNtSfiMqy:pTuRskXRRHjJKJOVGYt3VE0+GMNt09j
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\YUR4CF7.exe 36ad2bfc5bb7814a93a701a98d252730.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1516 36ad2bfc5bb7814a93a701a98d252730.exe 1516 36ad2bfc5bb7814a93a701a98d252730.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1516 36ad2bfc5bb7814a93a701a98d252730.exe 1516 36ad2bfc5bb7814a93a701a98d252730.exe