Analysis
-
max time kernel
204s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 11:08
Behavioral task
behavioral1
Sample
f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe
-
Size
2.8MB
-
MD5
3863a90a25bfe16e0cd0813544a8106c
-
SHA1
02c15a22c90a8dc01949fa5bc1239b02b0d3df2e
-
SHA256
f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9
-
SHA512
022c46ac4f819a97faadbb8ae819881e42f19609b085d5a25f759ba6b52a67cc98572e27765555cb6c46942cdbf476eed0dcf5cb8ec50909a11781bb7de97d3d
-
SSDEEP
49152:6kt+/C6eHCGrMYmK4XIrBM3B41MwYqrh25KCj9VIDsXgWiawg7aGPcInuly232Ep:PtjiGrdmnXIm41Mwj05J5GJW9770Ty2B
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1476-136-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-137-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-138-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-140-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-142-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-144-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-148-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-146-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-151-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-153-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-155-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-157-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-159-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-161-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-163-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-165-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-167-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-169-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-171-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-173-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-175-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-177-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-179-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/1476-181-0x0000000010000000-0x000000001003D000-memory.dmp upx -
resource yara_rule behavioral2/memory/1476-132-0x0000000000400000-0x0000000000A59000-memory.dmp vmprotect behavioral2/memory/1476-133-0x0000000000400000-0x0000000000A59000-memory.dmp vmprotect behavioral2/memory/1476-180-0x0000000000400000-0x0000000000A59000-memory.dmp vmprotect behavioral2/memory/1476-182-0x0000000000400000-0x0000000000A59000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1476 f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe 1476 f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe 1476 f5d277a83137161f0c749a67076fb568226d24026e6b0dfb0bf4b741868314d9.exe