Analysis
-
max time kernel
116s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 09:40
Behavioral task
behavioral1
Sample
67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe
Resource
win10v2004-20220812-en
General
-
Target
67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe
-
Size
5.6MB
-
MD5
75a7c6a2cb7ee9a78da9458980c6bf9f
-
SHA1
1441de90928c63974d103873c6cd506e183e6ed6
-
SHA256
67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4
-
SHA512
2d0ed260cf9588e1464a909aa59b54683f43e91a684462686d487c6f16e8b5b1699d9fc3ef9dec2c853f171670b957bb1298309170d9ce88f0e956c0ac74a3c7
-
SSDEEP
98304:kSNpe3OaLCqmKQhPuiqNk3QbypR5L2Arsg6uww09zSGmoTqT8Kl2T8WysWWOqLMN:kSNpeZlmKTAUK76tzPmmqgKl2T8WXWW8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4352-132-0x0000000000400000-0x0000000000E28000-memory.dmp vmprotect behavioral2/memory/4352-135-0x0000000000400000-0x0000000000E28000-memory.dmp vmprotect behavioral2/memory/4352-136-0x0000000000400000-0x0000000000E28000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exepid process 4352 67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe 4352 67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe 4352 67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe 4352 67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exepid process 4352 67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe 4352 67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe"C:\Users\Admin\AppData\Local\Temp\67bb72270e54d8c426f810be6a1558b3b9810b811e208bb49a27299a23d0e7f4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx