Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 10:30
Behavioral task
behavioral1
Sample
xhphonescan.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
xhphonescan.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
Behavioral task
behavioral3
Sample
װ˵.url
Resource
win7-20240221-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral4
Sample
װ˵.url
Resource
win10v2004-20240226-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
xhphonescan.exe
-
Size
288KB
-
MD5
bd97b0dc68818a7cbffa6500c2c775f6
-
SHA1
029dcfed7e4358b5826f05c0456ee31b40f43c96
-
SHA256
fd39fe0fafb9832794e89b452b998abbb0a31e13f7575e19894a8ab336cd4b0b
-
SHA512
4fe8f8bcae786d22735bf1d6d0146f0d6ab646c08f812c3fb622ba132c61ba5bfd0bf7a9cac27d825b2a394870242c4f5b599b8ac6f162b81c77b06717a8db1d
-
SSDEEP
6144:YKyRdy5NLYcN0QgivUtv9tF89i3IyO40f9dpjK1wA:zCdy5BmQgAAXW9X201dca
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1864-0-0x0000000000400000-0x00000000004BD000-memory.dmp upx behavioral1/memory/1864-2-0x0000000000400000-0x00000000004BD000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1864 xhphonescan.exe 1864 xhphonescan.exe 1864 xhphonescan.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1864 xhphonescan.exe 1864 xhphonescan.exe 1864 xhphonescan.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1864 xhphonescan.exe 1864 xhphonescan.exe