Analysis
-
max time kernel
135s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09-02-2023 11:45
Behavioral task
behavioral1
Sample
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe
Resource
win10v2004-20220812-en
General
-
Target
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe
-
Size
1.1MB
-
MD5
4d1c395291b2f64896d81ee610bb7229
-
SHA1
744e6cc186db7e1d02195deccf763064ec9f5615
-
SHA256
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0
-
SHA512
36af4f21a433b5501a6b1bcd78e4be51f6af62078433336524c85f7cebffa76d090528f182b7dc5a79dce11910b62995eec38700b4563fa36098ed8223e774f8
-
SSDEEP
24576:lDgqbFsITgfTTgYchKJIX/MdYp12WuyT9GweLRJL1bfPLFSvl4v:lcqb5UfxW712WuqODL1bfP4l4v
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/268-56-0x0000000000250000-0x000000000025B000-memory.dmp upx behavioral1/memory/268-57-0x0000000000250000-0x000000000025B000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exepid process 268 e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe 268 e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-55-0x0000000000400000-0x0000000000619000-memory.dmpFilesize
2.1MB
-
memory/268-54-0x0000000075891000-0x0000000075893000-memory.dmpFilesize
8KB
-
memory/268-56-0x0000000000250000-0x000000000025B000-memory.dmpFilesize
44KB
-
memory/268-57-0x0000000000250000-0x000000000025B000-memory.dmpFilesize
44KB
-
memory/268-58-0x0000000000400000-0x0000000000619000-memory.dmpFilesize
2.1MB