Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 09:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5885f32da261e4016a235034c201342d.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5885f32da261e4016a235034c201342d.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
5885f32da261e4016a235034c201342d.exe
-
Size
20KB
-
MD5
5885f32da261e4016a235034c201342d
-
SHA1
5fa28e6338a4b73db9a6f7666ae4aa230e5a1d9d
-
SHA256
3ccd0c00d3d067204fef28aafcfc48055b51a7550e5a5d2276939652388cc5ab
-
SHA512
a285706b5ced6082325e549173fe2fc312f448b84ec3296be1882b24a2b9f5e7e908a0ea36a7ea59cceba0e77326d37583db3767655584f176ed59e428934d03
-
SSDEEP
192:D1Hotq5n9cdjQoWC+QPP1oynEqvCatR51:DVo4IvWC+g12qvCan5
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sua = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5885f32da261e4016a235034c201342d.exe" 5885f32da261e4016a235034c201342d.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sua 5885f32da261e4016a235034c201342d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 5885f32da261e4016a235034c201342d.exe