Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 13:51
Behavioral task
behavioral1
Sample
8c7d56cb647f02eb4a714e22a1efddba.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8c7d56cb647f02eb4a714e22a1efddba.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
8c7d56cb647f02eb4a714e22a1efddba.exe
-
Size
89KB
-
MD5
8c7d56cb647f02eb4a714e22a1efddba
-
SHA1
ac246c2292408001c5e7b5019c5b8855687d5404
-
SHA256
6dae22d8e4744b9217d4bf2afaa97a8390114e88e6c8876c1e26469daafccb5a
-
SHA512
de2dfd9db927a711ca4c7e18355a57a8344a3448df62da8f89c58afa4f9b49dc2fe47a7ba671072493fc1627430c733eaa5fa18ccbbb6412056474cf5ee28ef7
-
SSDEEP
1536:OtKdXZa0b2Nn4aA14ED+QyPeaJszglV/npm4aS8F7FDdR6zhOIpAoMsz:AkXZ/KAeECPAgjnk4aZF7FiFtBb
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1644-0-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1644-3-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSFox = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8c7d56cb647f02eb4a714e22a1efddba.exe" 8c7d56cb647f02eb4a714e22a1efddba.exe