Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
cada52b9b61173e17437007c772ed958.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
cada52b9b61173e17437007c772ed958.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
cada52b9b61173e17437007c772ed958.exe
-
Size
315KB
-
MD5
cada52b9b61173e17437007c772ed958
-
SHA1
907a9ec77ad9e3f005cd1e0d258fb057a30766b7
-
SHA256
1151c6818c6aa3bf48fb778b4456d5b3a93c8e9e1d0571a359410f9fbe3eea10
-
SHA512
457a2b401459439a029553791fdf821c1311ff94c4bda591467bcdd7a1e1a60212a0d296042a791f9899e715e29b8681cee0beab3437fdb478c8eb4523c2a2a2
-
SSDEEP
6144:w4eR7knuxzOf5XQAQRcdwLciBkRvq5v+rRNiCqM:w4I7vxzUvjTlROvQbim
Score
6/10
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ProTasker.job cada52b9b61173e17437007c772ed958.exe