Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 00:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8dcd6245afcc2c71d60164412f39eb36.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8dcd6245afcc2c71d60164412f39eb36.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
8dcd6245afcc2c71d60164412f39eb36.exe
-
Size
112KB
-
MD5
8dcd6245afcc2c71d60164412f39eb36
-
SHA1
7144491e9fa158a33597f2d6ce3d8b4782aae364
-
SHA256
cab5fdd784be40a598c7f3746c7b4b7eb6b06bd319767658965d30ef6fc00171
-
SHA512
08a7f6ec74d001b42431a9e1c517cb8a6563a32f7cb934ec12ef56606d6dc9359c411e0ffc24ce34c830f6aaeb59c2788a1400733b4612e20ff6278d1a44968a
-
SSDEEP
3072:qRPB5yVbG7VnqzH0sRti027R9HLkxfV/9xDC:qlLysPGw0C9HAVxDC
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Memory manager = "\\System\\memdrv32.exe" 8dcd6245afcc2c71d60164412f39eb36.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 8dcd6245afcc2c71d60164412f39eb36.exe Key created \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 8dcd6245afcc2c71d60164412f39eb36.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main 8dcd6245afcc2c71d60164412f39eb36.exe