Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491.exe
Resource
win10v2004-20231215-en
General
-
Target
5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491.exe
-
Size
10.0MB
-
MD5
8deb39ac4a760d3ae295a37953be51a0
-
SHA1
1d01f59877ae062a2906fa8fbc1e3f74cb925c4f
-
SHA256
5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491
-
SHA512
54fdef87c19cbe77bcdee1c75f937b74ff3675024ac1f95c3faf062bc24055f273d7d9f58c169644496e50e41b4e984a4a24251aa03784f360273293d98a8b38
-
SSDEEP
196608:V1BOY2Ug73xNkMjC5zsA80p7KFq6+pm/CNs2EKjzbxd4oN5Hk+k4wiOu:ZOYMTFCW4dk+JNsKd4ojk4wiOu
Malware Config
Signatures
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491.exe 5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491.exe\IsHostApp 5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 5175f0936ab3330e8206215761d6546baf02ebfac1086323196465d10af68491.exe