Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19/08/2024, 20:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
WinDivert.dll
Resource
win10-20240611-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
WinDivert64.sys
Resource
win10-20240404-en
0 signatures
150 seconds
Behavioral task
behavioral3
Sample
clumsy.exe
Resource
win10-20240404-en
2 signatures
150 seconds
General
-
Target
clumsy.exe
-
Size
1.4MB
-
MD5
e08b34a17ffb179d98d3452107e07189
-
SHA1
f89c80d58497e88577f77d21f44c08d0ff89cdc4
-
SHA256
088d012a3d2788f797faf54d4f3db945c84ddab03a656c24d3badb06ae74324e
-
SHA512
e3dc85f8134fd09a725a0081efbb8816b82e61131e6c98882dda44b10467f7042f6bd9b30854d4a4f8c6e0449132b8d27aebac58fed2c15fc7dd81178db63d5f
-
SSDEEP
24576:qjp/TkhdH/OHW2Cq1aaIQtGymaADRQpNBmCD:ql/whdYcqUAG9DRorm
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 624 Process not Found 624 Process not Found 624 Process not Found 624 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 588 clumsy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\clumsy.exe"C:\Users\Admin\AppData\Local\Temp\clumsy.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:588
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4752