Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 05:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dd5c73035fb72ce3705c51e7b0963ff1.exe
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
dd5c73035fb72ce3705c51e7b0963ff1.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
dd5c73035fb72ce3705c51e7b0963ff1.exe
-
Size
15KB
-
MD5
dd5c73035fb72ce3705c51e7b0963ff1
-
SHA1
44eb34c403f5452494c87a96f13d07e137924e63
-
SHA256
6c29b15b15567414540004b8235d00a51068d10f28c4681fd882e4cea80718fb
-
SHA512
ac11b45fe46cd16b9245aa3aaac0899dbc2354387baa10bd3c5d80c799e70cda8b1c6a013e76f95fd4fe53c5f232f74547f4b20d3b11057cee38f4f6e294255e
-
SSDEEP
192:tiHcdcfRBGsyEBExaH4/UKfwEVSVWiQMTTv1I1Sn13HNvZIAs8GadNzs68:ti8dcfRBGs+xaH0DxMFI1c1BNs8pTg
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1656-0-0x0000000007000000-0x000000000700A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dd5c73035fb72ce3705c51e7b0963ff1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\4v9cf3t77l = "C:\\Users\\Admin\\4v9cf3t77l.exe" dd5c73035fb72ce3705c51e7b0963ff1.exe