Analysis
-
max time kernel
141s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
25-06-2023 19:56
Behavioral task
behavioral1
Sample
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe
Resource
win10v2004-20230621-en
General
-
Target
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe
-
Size
4.1MB
-
MD5
e85c182fc47e58b013ee6df3cc313be4
-
SHA1
d0fbe8d4433147a441e13a258a193a12179a5e62
-
SHA256
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216
-
SHA512
ac7bea5f30a6d01a67a5b79c1f2d1ab8fe9dd57b704f39b9685e7f333b087a32c4d1d05be5468474b46eae8664d4f54d6756407471673b3b2df78837ff07a0b8
-
SSDEEP
98304:6+UtuSkACq+T2tz5oacAioxTjShpZq84Yok8Sd4Zy:6FtlpCqBzSatimjSRq8448SuZy
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2040-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-101-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-99-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-103-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2040-105-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exepid process 2040 bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe 2040 bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe 2040 bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe