Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 10:15
Behavioral task
behavioral1
Sample
7cdbde4d80c5214f3accfe0fa917baf7.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7cdbde4d80c5214f3accfe0fa917baf7.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
7cdbde4d80c5214f3accfe0fa917baf7.exe
-
Size
84KB
-
MD5
7cdbde4d80c5214f3accfe0fa917baf7
-
SHA1
eb37bdacd30de3caaff4e79d71536694f7bccfdc
-
SHA256
bd737473092b8b64e7acdd94ca30a962c5db9de11253342e0ba303c64503d9d0
-
SHA512
247e7510c5a25ff16676005761277e3658652bb7f67e7a1b8a2d5baa83c4000343802079fadfbfecf2ef502604aa4c1588258b901240a82f800c96767a95c893
-
SSDEEP
1536:EVtwLeVEtmcvgzEHhZVHRuyslWKopLuyVS93146ceJ2W6xvdBAbRIK6eiyAD:Emm3EHRRuykSbVS98j/B0bRz67D
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2512-0-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2512-6-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2512 7cdbde4d80c5214f3accfe0fa917baf7.exe