Analysis
-
max time kernel
202s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 04:46
Behavioral task
behavioral1
Sample
Pc2dialer.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Pc2dialer.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
pc2phone.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
pc2phone.exe
Resource
win10v2004-20220812-en
General
-
Target
Pc2dialer.exe
-
Size
487KB
-
MD5
3399a53d376910e796dfc7c24e8d506f
-
SHA1
4ddfc8cd02d72c1f022d38d7c2b6bfff87491592
-
SHA256
ff2079bee75cb84494ae4b39a2cba2654cddd8498cbee9cba4f925362653cba1
-
SHA512
6fd68386e72ab0f96d6322024c8bc79238cae2fd8c2377f23ed217d8fe1f756a6f09c95dbba45741013e718d1d0013c9daa19be0f0a3fb50366cc361fff53b52
-
SSDEEP
12288:yik5diJd83cpvevhSS4byNZMmtupNXbB18hePoY5L9FJZjWXFyF:yi2ij2MOSFTmtupNrB13AoL9FXyXFyF
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3968-132-0x0000000000400000-0x0000000000BFC000-memory.dmp upx behavioral2/memory/3968-133-0x0000000000400000-0x0000000000BFC000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Pc2dialer.exepid process 3968 Pc2dialer.exe 3968 Pc2dialer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Pc2dialer.exepid process 3968 Pc2dialer.exe 3968 Pc2dialer.exe