Analysis
-
max time kernel
180s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 04:12
Behavioral task
behavioral1
Sample
3bdc84a553dcb36e784e3227c5e6814c.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3bdc84a553dcb36e784e3227c5e6814c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
3bdc84a553dcb36e784e3227c5e6814c.exe
-
Size
196KB
-
MD5
3bdc84a553dcb36e784e3227c5e6814c
-
SHA1
4907134a2f42b37f048cac3d6bd011d8e1740a88
-
SHA256
e757986662668e632610a99563a1484c476b3a5953d78a0fc26b0229b08b1275
-
SHA512
77ef017a4ea66135f6022d21cc62637d4ba48c29caa6ee8b7281d5bda454aa6c28427d8fc2915810d7385feccc35c26771dcc464c51098bc71966aaf50e8ab95
-
SSDEEP
3072:ixha8v34ll1YKxSBk6q0Alg0d2Xr4DqtZnhH0Kxrm0FArGHElMl8XEIQFVp1LSZc:WakmbDMLcu0e9CwKQigIQFV3LzrzoSGw
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/700-0-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/700-1-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/700-2-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/700-3-0x0000000000400000-0x0000000000472000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 700 3bdc84a553dcb36e784e3227c5e6814c.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 700 3bdc84a553dcb36e784e3227c5e6814c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 700 3bdc84a553dcb36e784e3227c5e6814c.exe