Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 23:57
Behavioral task
behavioral1
Sample
63f2cef2c2b181f1fd5393cc0321805d.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
63f2cef2c2b181f1fd5393cc0321805d.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
63f2cef2c2b181f1fd5393cc0321805d.exe
-
Size
10KB
-
MD5
63f2cef2c2b181f1fd5393cc0321805d
-
SHA1
c17bbf243eebf317098cbca18f738ea3ddd30491
-
SHA256
8bff03dc3a40fd1664ff4197d90a799c3381055ae7923f820645da5a1271b2b4
-
SHA512
c59d1c7bd5ad465fb496112c243f76a5547964807584141f7455991b871369f0818d736d90ea7d306bdad34bdd77c23eb3e6724367e06df1c94bf933d1524ac0
-
SSDEEP
192:+7nbF8XzfAct+DC1RITtrx7WXXHuDpkLEquh3QDWE:MhAzHcDC1STFx7EXLIqWI
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 63f2cef2c2b181f1fd5393cc0321805d.exe -
resource yara_rule behavioral2/memory/5088-0-0x0000000000400000-0x0000000000405000-memory.dmp upx behavioral2/memory/5088-2-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/5088-3-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/5088-5-0x0000000000400000-0x0000000000405000-memory.dmp upx behavioral2/memory/5088-4-0x0000000000400000-0x0000000000408000-memory.dmp upx