Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 11:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7a10c8c00396d644c361558bbbca3a68.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7a10c8c00396d644c361558bbbca3a68.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
7a10c8c00396d644c361558bbbca3a68.exe
-
Size
15KB
-
MD5
7a10c8c00396d644c361558bbbca3a68
-
SHA1
fad5a40cbbb9abc40aae890b337f95625141b97c
-
SHA256
85a910a3eba05a4bb3590dee885c8fb57f40a67a5df96892b7a732e0a0e428bb
-
SHA512
1ad1e0e284b23960788a46e3fb200aa485f9d99517b8fb5d6aef802ef3329d0a43dfc0e3a66c537a100f6f778f5e9fac23a2e2f74bbd47d91a0068e4e4145d94
-
SSDEEP
384:xqiVmISB1eHE2PUFt+ZibR2GoEitdp31eEx:oiVY1eHzi+EbSEEx13
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1252-0-0x0000000007000000-0x000000000700A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e9xrmytb7o = "C:\\Users\\Admin\\e9xrmytb7o.exe" 7a10c8c00396d644c361558bbbca3a68.exe