Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
7516c9810867a33c21e80acac0a9b2a1.exe
Resource
win7-20231215-en
General
-
Target
7516c9810867a33c21e80acac0a9b2a1.exe
-
Size
2.6MB
-
MD5
7516c9810867a33c21e80acac0a9b2a1
-
SHA1
a23c21abab0afa3a1d0ae727f1666c303fd0b058
-
SHA256
484349ea079bd611210283171441c46fe9461fb93f9ec7b7ce5757eb1892f0b3
-
SHA512
5ff730f07423bb201634cd6f8504682e3927b7861bc16a0aded3d956da4abf3bb0f062d1c0f52018fb998d139fb4a4b6c03c383958116f314662ac50ce905412
-
SSDEEP
12288:R2kKjkC+2BJ+iEpb7Pzz/KlRZFHb+uRB7Q5Sdn:Ro/+x7PzzSlRZFHb+GRQ5Sd
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\Skunk.exe 7516c9810867a33c21e80acac0a9b2a1.exe File opened for modification C:\WINDOWS\SysWOW64\Skunk.exe 7516c9810867a33c21e80acac0a9b2a1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2508 7516c9810867a33c21e80acac0a9b2a1.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD57516c9810867a33c21e80acac0a9b2a1
SHA1a23c21abab0afa3a1d0ae727f1666c303fd0b058
SHA256484349ea079bd611210283171441c46fe9461fb93f9ec7b7ce5757eb1892f0b3
SHA5125ff730f07423bb201634cd6f8504682e3927b7861bc16a0aded3d956da4abf3bb0f062d1c0f52018fb998d139fb4a4b6c03c383958116f314662ac50ce905412