Analysis
-
max time kernel
148s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/10/2022, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe
Resource
win10v2004-20220901-en
General
-
Target
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe
-
Size
3.9MB
-
MD5
1d41e4a84f04b2488a7b4478f125a9bd
-
SHA1
19fef90785b0588ae2f990fec4b1dc64cf5be1f4
-
SHA256
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a
-
SHA512
dd1da882cb49f67fa95234ad082044bed0dfeec58224ab5848a0457f47cf7d44cad28f424e5e72e0a3ada9f11eaa633bf029a902f8a241ad0c82727c0cc1e562
-
SSDEEP
49152:dfXpGk6FZymh5UwfIXzaBX1mDfE1ssQXwsONsmsmKSopYkR9hgU7tfUO7aTAx:DWFQ69IXzaBX1CfdsQXwNNq93tlR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1112-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1112-98-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1112 3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe 1112 3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe 1112 3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe