Analysis
-
max time kernel
192s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 15:47
Static task
static1
Behavioral task
behavioral1
Sample
b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088.exe
Resource
win10v2004-20221111-en
General
-
Target
b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088.exe
-
Size
569KB
-
MD5
439a53cc40aecb4080f554a35a4d1d5f
-
SHA1
1213ce02df662780bbc2170952c3b2abbd4981b8
-
SHA256
b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088
-
SHA512
d6cf17ada8f223253ba94c7c3dd5293fd55f1ab0cae3c5798df748815ac33c335b13ee8e05c849e263ce895b7303256b7770d6aec37d5a03980ef9d81e462f4e
-
SSDEEP
12288:xyeDVgl1744Xj5lwFrd3RlE8W5+X8DQS1fybO6tbTnldB3zBu:zgfEy5m4151NYC6tPnldFB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3716-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-142-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-148-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-150-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-160-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-176-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-178-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-180-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3716-181-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3716 b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088.exe 3716 b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088.exe 3716 b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088.exe 3716 b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088.exe 3716 b0c9591b6a9cd877863e338a48ad4f9fc1da526ed84f02ed79513069fdb44088.exe