Analysis
-
max time kernel
11s -
max time network
2s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 23:39
Behavioral task
behavioral1
Sample
da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe
-
Size
661KB
-
MD5
d902fe93994ee1542a4046b982a01d67
-
SHA1
742315be46dc1644e5dbc61fab5241705c6e54c6
-
SHA256
da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33
-
SHA512
b2e8ee0b8cffd5a9e6cf6bdcd801f39f2e7c8ffdfc020e50c22a793d0557a1589c1328b10d4080c4ff2900b544cd48393ba71273bee9ed06741ea3fe55e8be94
-
SSDEEP
12288:EOUZG7R//TENWYbZIB9Sf7S5eO9Q4gkoB:bUZG7FHW1S5zydN
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3036-132-0x0000000000400000-0x00000000005F6000-memory.dmp upx behavioral2/memory/3036-133-0x0000000000400000-0x00000000005F6000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3036 da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3036 da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe 3036 da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe"C:\Users\Admin\AppData\Local\Temp\da0f0d77ff4b6b11cd14f6e9af3e277ff2c6fee7e3d26714d640ea03666e5d33.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3036