Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:24
Behavioral task
behavioral1
Sample
39b8f8d4bc14e0bb7cae14800aaa4f75.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
39b8f8d4bc14e0bb7cae14800aaa4f75.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
39b8f8d4bc14e0bb7cae14800aaa4f75.exe
-
Size
85KB
-
MD5
39b8f8d4bc14e0bb7cae14800aaa4f75
-
SHA1
e7ffe2350d03337591688c74882e37a377d9ae81
-
SHA256
55cfe7d7ab70bb8c872a756295ea930eb8e63be9fcb1dbd4d9be7cdc689c5aa0
-
SHA512
d78d2fc34ed159660e1a9da76ec3e134e27f49c2b63d9efa20aa2dfb308e7eb55ebe51d593358e3853c118da7bd36b466deaa93158022116dbbc21d8ed3243d4
-
SSDEEP
1536:etcRD0FuXLU6Tta3WIaOx3U+fl942u6CWjOpzYGmrRDDKVs2eelfHO9uzIXCCAg5:tRD0ULU6Tta3WIjaed5SVYBFDDKC2ee2
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2084-0-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/2084-1-0x0000000000400000-0x0000000000431000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFox = "C:\\Users\\Admin\\AppData\\Local\\Temp\\39b8f8d4bc14e0bb7cae14800aaa4f75.exe" 39b8f8d4bc14e0bb7cae14800aaa4f75.exe