Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2023 11:45
Behavioral task
behavioral1
Sample
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe
Resource
win10v2004-20220812-en
General
-
Target
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe
-
Size
1.1MB
-
MD5
4d1c395291b2f64896d81ee610bb7229
-
SHA1
744e6cc186db7e1d02195deccf763064ec9f5615
-
SHA256
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0
-
SHA512
36af4f21a433b5501a6b1bcd78e4be51f6af62078433336524c85f7cebffa76d090528f182b7dc5a79dce11910b62995eec38700b4563fa36098ed8223e774f8
-
SSDEEP
24576:lDgqbFsITgfTTgYchKJIX/MdYp12WuyT9GweLRJL1bfPLFSvl4v:lcqb5UfxW712WuqODL1bfP4l4v
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3968-132-0x0000000000740000-0x000000000074B000-memory.dmp upx behavioral2/memory/3968-134-0x0000000000740000-0x000000000074B000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exepid process 3968 e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe 3968 e981ca849f3c87317bbcbc7cd70e824040eb40929c2b53552ecb9f42ebd943c0.exe