Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:53
Behavioral task
behavioral1
Sample
43003bb4ab52ec2a7b4317c82f3e8a9c57455bc68cd2abdd36fd928b2b5310db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43003bb4ab52ec2a7b4317c82f3e8a9c57455bc68cd2abdd36fd928b2b5310db.exe
Resource
win10v2004-20220812-en
General
-
Target
43003bb4ab52ec2a7b4317c82f3e8a9c57455bc68cd2abdd36fd928b2b5310db.exe
-
Size
228KB
-
MD5
d97fdbb5db487728464408abbba56815
-
SHA1
3b6901aee8958258a9e3be771a233870f4b4fe66
-
SHA256
43003bb4ab52ec2a7b4317c82f3e8a9c57455bc68cd2abdd36fd928b2b5310db
-
SHA512
489eb0ac5d3f879a9eee34e8789b10b0743926d4ce25f0f2ba5c5386a67db1f389f5a5f6b60498fde3220c9458e53d5f5a17d09fc573ae47e04454d1008c68e3
-
SSDEEP
6144:5CloTDGPUMQdoidptDbyN/4Lpy41m27uiXZ9ywgsM/8:5CIDG8RoidptDbyVWpJ5uiXZqD
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4824-132-0x0000000000400000-0x0000000000496000-memory.dmp vmprotect behavioral2/memory/4824-135-0x0000000000400000-0x0000000000496000-memory.dmp vmprotect behavioral2/memory/4824-136-0x0000000000400000-0x0000000000496000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
43003bb4ab52ec2a7b4317c82f3e8a9c57455bc68cd2abdd36fd928b2b5310db.exepid process 4824 43003bb4ab52ec2a7b4317c82f3e8a9c57455bc68cd2abdd36fd928b2b5310db.exe