Analysis
-
max time kernel
315s -
max time network
359s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 12:22
Behavioral task
behavioral1
Sample
4de27e065c74e0e444d1ea6a6675b7d378ea1488744d393f4c7fb4f534dfae47.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4de27e065c74e0e444d1ea6a6675b7d378ea1488744d393f4c7fb4f534dfae47.exe
Resource
win10v2004-20221111-en
General
-
Target
4de27e065c74e0e444d1ea6a6675b7d378ea1488744d393f4c7fb4f534dfae47.exe
-
Size
560KB
-
MD5
77db9f825cedf4313046f726095ba901
-
SHA1
a202442cb9defa58ccf76e818176c5ca53b6fdf0
-
SHA256
4de27e065c74e0e444d1ea6a6675b7d378ea1488744d393f4c7fb4f534dfae47
-
SHA512
9bd51374e452f8c3df223da208d8902cc6140c203bf6c38916f9cc87c70c3bc1cb39c98e5a8ce9c19ae91a626920fdb0c725c7450baf8e4b942c8bc4e8ad7657
-
SSDEEP
12288:f26SQV39ybb6nlUalO53hwBNXpBrvYuMFS8BtgL/KLtB:+T8ybulU8OTwLTwVk8b
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4604-132-0x0000000000400000-0x00000000005A1000-memory.dmp vmprotect behavioral2/memory/4604-133-0x0000000000400000-0x00000000005A1000-memory.dmp vmprotect -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 652 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
4de27e065c74e0e444d1ea6a6675b7d378ea1488744d393f4c7fb4f534dfae47.exepid process 4604 4de27e065c74e0e444d1ea6a6675b7d378ea1488744d393f4c7fb4f534dfae47.exe 4604 4de27e065c74e0e444d1ea6a6675b7d378ea1488744d393f4c7fb4f534dfae47.exe