Analysis
-
max time kernel
117s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
09/02/2023, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
684e1dd7203a2db6af33f0ccc186d9589744faa6e6010f3d2c99472972771c93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
684e1dd7203a2db6af33f0ccc186d9589744faa6e6010f3d2c99472972771c93.exe
Resource
win10v2004-20221111-en
General
-
Target
684e1dd7203a2db6af33f0ccc186d9589744faa6e6010f3d2c99472972771c93.exe
-
Size
5.1MB
-
MD5
4e96eaebc5b2adc5ab1a63089beeba3d
-
SHA1
a89801a687b4f99ea932cc366993711e764a5cb3
-
SHA256
684e1dd7203a2db6af33f0ccc186d9589744faa6e6010f3d2c99472972771c93
-
SHA512
080fcf41cc79f16604af50fc2b2693b6467ae207851d61cc5f9b4f6d60072b8be9803f8fc48cbebba1f64892339f55893dc98e94ee28bd4be133a9eb7b5bddc7
-
SSDEEP
98304:KcdO9IeF/5SbWf+YFCXfNGdZcURzA5vJBAUZLHp3gCMYpMkgFoM//JKZFkag:sFQaf+HPEdZAJVV1MY7gqMXyFTg
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3100-132-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-140-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-142-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-148-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-150-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-160-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-175-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-176-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-177-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-179-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-182-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-181-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-184-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-186-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-188-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-190-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-192-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-196-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-194-0x00000000028B0000-0x00000000028EE000-memory.dmp upx behavioral2/memory/3100-219-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3100-220-0x00000000028B0000-0x00000000028EE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3100 684e1dd7203a2db6af33f0ccc186d9589744faa6e6010f3d2c99472972771c93.exe 3100 684e1dd7203a2db6af33f0ccc186d9589744faa6e6010f3d2c99472972771c93.exe 3100 684e1dd7203a2db6af33f0ccc186d9589744faa6e6010f3d2c99472972771c93.exe 3100 684e1dd7203a2db6af33f0ccc186d9589744faa6e6010f3d2c99472972771c93.exe