Analysis
-
max time kernel
58s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 11:08
Behavioral task
behavioral1
Sample
f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe
-
Size
2.8MB
-
MD5
3863a90a25bfe16e0cd0813544a8106c
-
SHA1
02c15a22c90a8dc01949fa5bc1239b02b0d3df2e
-
SHA256
f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9
-
SHA512
022c46ac4f819a97faadbb8ae819881e42f19609b085d5a25f759ba6b52a67cc98572e27765555cb6c46942cdbf476eed0dcf5cb8ec50909a11781bb7de97d3d
-
SSDEEP
49152:6kt+/C6eHCGrMYmK4XIrBM3B41MwYqrh25KCj9VIDsXgWiawg7aGPcInuly232Ep:PtjiGrdmnXIm41Mwj05J5GJW9770Ty2B
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1968-59-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-60-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-58-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-62-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-64-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-68-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-70-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-66-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-74-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-76-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-80-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-84-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-86-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-89-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-95-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-99-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-97-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-101-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-93-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-91-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-82-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-78-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1968-72-0x0000000010000000-0x000000001003D000-memory.dmp upx -
resource yara_rule behavioral1/memory/1968-55-0x0000000000400000-0x0000000000A59000-memory.dmp vmprotect behavioral1/memory/1968-88-0x0000000000400000-0x0000000000A59000-memory.dmp vmprotect behavioral1/memory/1968-102-0x0000000000400000-0x0000000000A59000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1968 f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe 1968 f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe 1968 f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe