Analysis
-
max time kernel
141s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 09:38
Behavioral task
behavioral1
Sample
NRVP.exe
Resource
win7-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
NRVP.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
NRVP.exe
-
Size
9KB
-
MD5
f7349874043c175bee2d0ff66438cbf0
-
SHA1
da371495289e25e92ad5d73dff6f29beea422427
-
SHA256
f852b9baeeefde61a20e5de4751b978594a9bf3b34514bc652d01224ee76da1b
-
SHA512
878f4bc1ab1b84b993725bcf2e98b1b9dcb72f75a20e34287d13016cc72f1df0334ac630aa8604a3d25b9569be2541c8f18f4f644f5f31ff31dd2d3fedd6d1ad
-
SSDEEP
192:4oepY+hS8cXsJ66JR/Q02fPby2HasZfZT5vbeG:FH+hSLX4R/RETR6sZRT5r
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4032-0-0x00007FF73CD00000-0x00007FF73CD0C000-memory.dmp upx behavioral2/memory/4032-3-0x00007FF73CD00000-0x00007FF73CD0C000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION NRVP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\NRVP.exe = "11000" NRVP.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4032 NRVP.exe 4032 NRVP.exe