Analysis
-
max time kernel
91s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 11:50
Behavioral task
behavioral1
Sample
06e4338078c06fe98912508d741f4fc146eaa73713f4a9b92547ac356a06f20b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
06e4338078c06fe98912508d741f4fc146eaa73713f4a9b92547ac356a06f20b.exe
Resource
win10v2004-20220901-en
General
-
Target
06e4338078c06fe98912508d741f4fc146eaa73713f4a9b92547ac356a06f20b.exe
-
Size
1.9MB
-
MD5
1a80d9e2418d985d9640baa011d373df
-
SHA1
cb9102e31ac62e9016b0f17589a0d92e1f2aa029
-
SHA256
06e4338078c06fe98912508d741f4fc146eaa73713f4a9b92547ac356a06f20b
-
SHA512
7a6b4fbae5d870d2e41fb7ddf6f617968f1e0d8e8438ad282cbdb827608cf2f26f032512ea66ba4d0ba7c8ff40faf140a8865f2a6a03e345c8b07b40a5a45ac5
-
SSDEEP
49152:jBus53D7StwLcSTPBut+kpzvwm1c3s5edIBbHse5lr:jBuZ2oST5uthzvwm1JedIB4e5l
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/5028-135-0x0000000000400000-0x000000000086C000-memory.dmp vmprotect behavioral2/memory/5028-137-0x0000000000400000-0x000000000086C000-memory.dmp vmprotect behavioral2/memory/5028-138-0x0000000000400000-0x000000000086C000-memory.dmp vmprotect behavioral2/memory/5028-139-0x0000000000400000-0x000000000086C000-memory.dmp vmprotect -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 640 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
06e4338078c06fe98912508d741f4fc146eaa73713f4a9b92547ac356a06f20b.exepid process 5028 06e4338078c06fe98912508d741f4fc146eaa73713f4a9b92547ac356a06f20b.exe 5028 06e4338078c06fe98912508d741f4fc146eaa73713f4a9b92547ac356a06f20b.exe