Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-01-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
5c4906e6e704917e594aacab4fbe4e9d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c4906e6e704917e594aacab4fbe4e9d.exe
Resource
win10v2004-20231215-en
General
-
Target
5c4906e6e704917e594aacab4fbe4e9d.exe
-
Size
592KB
-
MD5
5c4906e6e704917e594aacab4fbe4e9d
-
SHA1
7fd08014da80980d397951638c80dab407e65d00
-
SHA256
b3bccc9d3f518da703d7f8124376167271f000ab31b42ce10182aec350ba9589
-
SHA512
9ae7439432883feb0218b5f76a523f3624a5573e70c34cadc7ed1d1df75f21cc0bbf935ebf2d65465eabbdb4e0f62b58a9ad35b674dc568ed531d5273d139c0a
-
SSDEEP
12288:KpFJD5O+B4Xh8tDMRyw8ELU4KA/uB65EUEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEN:KXDcx8tgRyLELrKAGB6uUEEEEEEEEEEa
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5c4906e6e704917e594aacab4fbe4e9d.lnk 5c4906e6e704917e594aacab4fbe4e9d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2656 5c4906e6e704917e594aacab4fbe4e9d.exe