Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 15:05
Behavioral task
behavioral1
Sample
8ca2cd4133d60533ff6874be9514911c.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8ca2cd4133d60533ff6874be9514911c.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
8ca2cd4133d60533ff6874be9514911c.exe
-
Size
386KB
-
MD5
8ca2cd4133d60533ff6874be9514911c
-
SHA1
05e9f739cbedb67fd3955a568c1cc9fd043822a9
-
SHA256
025bebe9b674e49c9ebe0680a99bdcbf70bca0024bc167a64a38a1993cc7eb8b
-
SHA512
8413bef99658f5d3c75f807d6428bd42d096175dd5303afb25185a1e5d54e8c15aa166d082b31c212deddf06d3f067675fd34f20d723288ae1528939c92fceaa
-
SSDEEP
6144:G/ssll8GC4s0dCPYZ8fheQrFk6/2EtwVluoAZ683x67ENuWMH/WlnTYnPqy:G/LlJfQwSfNry6EMvxtE/+nqq
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2632-0-0x0000000000400000-0x0000000000C81000-memory.dmp upx behavioral2/memory/2632-3-0x0000000000400000-0x0000000000C81000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8ca2cd4133d60533ff6874be9514911c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ca2cd4133d60533ff6874be9514911c.exe" 8ca2cd4133d60533ff6874be9514911c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2632 8ca2cd4133d60533ff6874be9514911c.exe