Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 17:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8fb5bed020b7bda0a325aebffbf2f3e3.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
8fb5bed020b7bda0a325aebffbf2f3e3.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
8fb5bed020b7bda0a325aebffbf2f3e3.exe
-
Size
213KB
-
MD5
8fb5bed020b7bda0a325aebffbf2f3e3
-
SHA1
9fa443bce1ff95ca771b9558e1c4a2d89b945214
-
SHA256
89302207b83702b3df34a3c7930bb822ad41933be5440506f2bcd44ec62f6702
-
SHA512
3647088a9c3e08a59f522de792853f781a74d3a2b3143f8ff56846765bf59c3f24cefe05047a3478b02523cdec0a80d10c105c22418e7cd7190a7f11d88dd8f5
-
SSDEEP
6144:gw0ItGdkGETKmXEMYn2Iy3GfFKSuI6xK2DCe:3rCpl2zYFDuI6xvl
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\orkut = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8fb5bed020b7bda0a325aebffbf2f3e3.exe" 8fb5bed020b7bda0a325aebffbf2f3e3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2336 8fb5bed020b7bda0a325aebffbf2f3e3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 8fb5bed020b7bda0a325aebffbf2f3e3.exe 2336 8fb5bed020b7bda0a325aebffbf2f3e3.exe