Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2023 19:56
Behavioral task
behavioral1
Sample
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe
Resource
win10v2004-20230621-en
General
-
Target
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe
-
Size
4.1MB
-
MD5
e85c182fc47e58b013ee6df3cc313be4
-
SHA1
d0fbe8d4433147a441e13a258a193a12179a5e62
-
SHA256
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216
-
SHA512
ac7bea5f30a6d01a67a5b79c1f2d1ab8fe9dd57b704f39b9685e7f333b087a32c4d1d05be5468474b46eae8664d4f54d6756407471673b3b2df78837ff07a0b8
-
SSDEEP
98304:6+UtuSkACq+T2tz5oacAioxTjShpZq84Yok8Sd4Zy:6FtlpCqBzSatimjSRq8448SuZy
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/780-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-177-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-179-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/780-180-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exepid process 780 bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe 780 bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe 780 bd43122a3beff36789a7c87e6ef7dacc1ba0f7b2e23d055a8355dc3a009e6216.exe