Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 05:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b0b39f058a958778b15a5c4589a2938d.exe
Resource
win7-20240611-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b0b39f058a958778b15a5c4589a2938d.exe
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
b0b39f058a958778b15a5c4589a2938d.exe
-
Size
58KB
-
MD5
b0b39f058a958778b15a5c4589a2938d
-
SHA1
4ac41974f8a14a102387651f14b8da04d76b347e
-
SHA256
83ddeae065372a15431613ae9bc04d476e1b06af5011809df3f7b21d5a3d262a
-
SHA512
7dda632e890f2e0dee9f7515976ca27399c9a3b4c554a046a344a212c6bbda85ff645b14167f088c2b32f101ce0c5062f78b9236d26fe61f82f7462baa03e3bd
-
SSDEEP
1536:VTdytmznUkJTbcBPQtXCUP5rKdQz4nBxP5l+KO816v:tdy0znnbpDlszql
Score
1/10
Malware Config
Signatures
-
Modifies registry class 4 IoCs
Processes:
b0b39f058a958778b15a5c4589a2938d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC2ECB00-E7D5-97A9-DD30-62AE349BBE9C} b0b39f058a958778b15a5c4589a2938d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC2ECB00-E7D5-97A9-DD30-62AE349BBE9C}\ = "lsthltvbrxtnlzzj" b0b39f058a958778b15a5c4589a2938d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC2ECB00-E7D5-97A9-DD30-62AE349BBE9C}\LocalServer32 b0b39f058a958778b15a5c4589a2938d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC2ECB00-E7D5-97A9-DD30-62AE349BBE9C}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b0b39f058a958778b15a5c4589a2938d.exe" b0b39f058a958778b15a5c4589a2938d.exe