Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 23:53
Behavioral task
behavioral1
Sample
c1edba032d15b2fdb73ff63bd76a7e02.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1edba032d15b2fdb73ff63bd76a7e02.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c1edba032d15b2fdb73ff63bd76a7e02.exe
-
Size
510KB
-
MD5
c1edba032d15b2fdb73ff63bd76a7e02
-
SHA1
3418a9369c086b137d383fa91925e992c8bf8c56
-
SHA256
42344726aaea0967113dc8b9ea6c5c197a9aaed33da26a325812c60a768d2efc
-
SHA512
26e9b291dee64df70b5efd64f5aeb80a556ca46b64e6558e02c11f767a71ccaaf6d94817a7b5d1ef3c7b0d3c0d74033347d6fce195f575a637e2659bef5df59e
-
SSDEEP
12288:iDeY3rxbl7Gr0pxYzf0U2z0jfPQoINIQ6MBMSgvItltMwKHKt8JS:ih6rJzfBBPQ8YzpltMwKHouS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2344-0-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-20-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-21-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-22-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-23-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-24-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-25-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-26-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-27-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-28-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-29-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-30-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-31-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-32-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-33-0x0000000000400000-0x0000000000590000-memory.dmp upx behavioral1/memory/2344-34-0x0000000000400000-0x0000000000590000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main c1edba032d15b2fdb73ff63bd76a7e02.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2344 c1edba032d15b2fdb73ff63bd76a7e02.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2344 c1edba032d15b2fdb73ff63bd76a7e02.exe 2344 c1edba032d15b2fdb73ff63bd76a7e02.exe 2344 c1edba032d15b2fdb73ff63bd76a7e02.exe 2344 c1edba032d15b2fdb73ff63bd76a7e02.exe