Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 01:13
Behavioral task
behavioral1
Sample
7e7bf7665c6b677db5ead09774731b92.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7e7bf7665c6b677db5ead09774731b92.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
7e7bf7665c6b677db5ead09774731b92.exe
-
Size
355KB
-
MD5
7e7bf7665c6b677db5ead09774731b92
-
SHA1
056804a0168eae3f7bd006253a206b4c60380b38
-
SHA256
36d024bad33e13c0ff964d2e1dab7aef2fdd956f9df7432cdbb655705025f713
-
SHA512
72f7b7010ddbff64f3ff5243029a58b8ec00c97233f2734ee8334e9786c8a16dcdea756ff0f60930cacee3542a1f122472f97fbde011ad410f62ac6957aa2fc4
-
SSDEEP
6144:EQg6R6F9j4z7WHf09RbMOs02+NfOV9ddrFm6UvjaEo+8NfWxU521nqSZK3LR:Jg6ZzS89qODdG9ddrILrCfWxw/3LR
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1888-0-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral1/memory/1888-2-0x0000000000400000-0x00000000004DB000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1888 7e7bf7665c6b677db5ead09774731b92.exe 1888 7e7bf7665c6b677db5ead09774731b92.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1888 7e7bf7665c6b677db5ead09774731b92.exe 1888 7e7bf7665c6b677db5ead09774731b92.exe