Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe
Resource
win10v2004-20220812-en
General
-
Target
a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe
-
Size
4.9MB
-
MD5
2872d4fdae8c6d69dd877efdfe5db0f6
-
SHA1
420e09eaeb463126e8a36c58239692d4311b9fd4
-
SHA256
a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1
-
SHA512
5ccb21c3cc03d490bfdebc44def0e3d7245c27d765b87c881eb84a4b3f47b2773018d47e14318f6aa7ace5b90986becfeec1fbdbdad6245df702557a1bdb1fc3
-
SSDEEP
98304:XqWPLOlgHPuN6a1RkqDR6bhJMtTYdATVcJ1Kg8I/O0Z3ymNsNxGQA8hNGj5PSYS:5qiPW62Rj6LkYdATVcJ1KgK0Z3yKK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4960-132-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4960-176-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4960 a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe 4960 a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe 4960 a4a30da567934f353e986c73aa3c9eb44709aaf08072271ed9a7df2dcd1108a1.exe