Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 05:25
Behavioral task
behavioral1
Sample
9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exe
Resource
win10v2004-20220812-en
General
-
Target
9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exe
-
Size
720KB
-
MD5
dbf9e31fcbaa517c50be72135075ac74
-
SHA1
a4e2fc6a7d61634ad78377fb27ffc48de6ff9865
-
SHA256
9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa
-
SHA512
4a0d7769a6fcab36da0a5f057e9a1b8bdd1be45ba0d5ebb87baa1e4489bc9827d63752a3174fda6b3c1fc465901458b5b9045ef26b0f97d9e2c39d0b6c20c4b3
-
SSDEEP
12288:aRu51JEHhxrrkBXrZMcU+mBC+mAfE2WMTyI5deKPKShF:aRavyxGXrZxcmuTTPKo
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1896-54-0x0000000000400000-0x00000000005F9000-memory.dmp vmprotect behavioral1/memory/1896-58-0x0000000000400000-0x00000000005F9000-memory.dmp vmprotect behavioral1/memory/1896-59-0x0000000000400000-0x00000000005F9000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exepid process 1896 9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exepid process 1896 9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exe"C:\Users\Admin\AppData\Local\Temp\9191033ee3d224e6150d3a5041a38b75bb1169cccb12f7eeb1e23a20ca2354fa.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx