Analysis
-
max time kernel
92s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 04:22
Behavioral task
behavioral1
Sample
888a8b5c1edcac5a923eaf477556b4d1.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
888a8b5c1edcac5a923eaf477556b4d1.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
888a8b5c1edcac5a923eaf477556b4d1.exe
-
Size
366KB
-
MD5
888a8b5c1edcac5a923eaf477556b4d1
-
SHA1
288208ca8581efe771466faf4fcc6b33e3d25cbe
-
SHA256
217f4ed647b7ff58480e5f0e1c7b9c97c4794100b058a6c0e0bf88f11d931eb5
-
SHA512
ca138e61f3eeee70dcc23a80a23a3f905702367f932bbc33a0780c16776d3d6527d886236a54a61857f59a453df897dfb75faff2f20870873152fdd9583c31c1
-
SSDEEP
6144:01dCFHNTlimVL8t9xPLMarcYAJv0NMiYtwJrtY:0aFHVzVyYar760KmrC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5004-0-0x0000000000150000-0x0000000000237000-memory.dmp upx behavioral2/memory/5004-2-0x0000000000150000-0x0000000000237000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\888a8b5c1edcac5a923eaf477556b4d1.exe = "0" 888a8b5c1edcac5a923eaf477556b4d1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5004 888a8b5c1edcac5a923eaf477556b4d1.exe 5004 888a8b5c1edcac5a923eaf477556b4d1.exe