Analysis
-
max time kernel
93s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 05:29
Behavioral task
behavioral1
Sample
8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe
Resource
win10v2004-20221111-en
General
-
Target
8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe
-
Size
1.3MB
-
MD5
0051b85562c7110847cfb5a9d1f87fcb
-
SHA1
837b2121db706aba595578dba70c5bc4335dc194
-
SHA256
8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e
-
SHA512
5d82cc8adc165611c52c60e9d22aa2cb969785a709e1e782700290838e166a57ebfada7853f123ace367fd91492b17dd33968e0bfaefc9a8fd1987a5384831dc
-
SSDEEP
24576:w31l3YmfmTrF7+L3MMMyuLhnCOyh5p9tXbu3yaVoWAKyl2III1IIaS:wF9rcrh+L8ESMph79tXGOXKyIIII1IIh
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2020-55-0x0000000000400000-0x0000000000784000-memory.dmp vmprotect behavioral1/memory/2020-57-0x0000000000400000-0x0000000000784000-memory.dmp vmprotect behavioral1/memory/2020-58-0x0000000000400000-0x0000000000784000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exepid process 2020 8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe 2020 8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exepid process 2020 8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe 2020 8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe 2020 8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe"C:\Users\Admin\AppData\Local\Temp\8f7c16c67512e0f6f8b20ef0058454a65adf1a7914d3a4c8e8eb93b72639195e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2020