Analysis
-
max time kernel
25s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe
Resource
win10v2004-20221111-en
General
-
Target
f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe
-
Size
5.2MB
-
MD5
0e85b64222a3f6acd34a8b60ed2abf2c
-
SHA1
40ccd52371e6e5ea87ad63ed310332eaa78a46f4
-
SHA256
f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8
-
SHA512
e99328aa0d53d6ce397bd0d43c47edb6c4df056d02e9d8f10fe3c28b7ca8540583bffbe5e06c5b276ed8a31c5242307f8549f985c0c2397686b9eb3a4d13061a
-
SSDEEP
98304:RQKmykXAAvAF6RKvMB9GAAWnlBsJ1uFST+sGCte2g791PM+J:kyQKkKgGAASB3FST+sGIZQ9m+J
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1360-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-101-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1360-102-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1360 f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe 1360 f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1360 f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe 1360 f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe 1360 f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe"C:\Users\Admin\AppData\Local\Temp\f67636582498e86c6a095880927f259feffdc93b6f64fc02f33d0feb9f1cf7b8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1360