Analysis
-
max time kernel
95s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 20:06
Behavioral task
behavioral1
Sample
44f2166052219dc7b6502dc5a8beb7fdb875aee7842f8147f99d4055accd63ce.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
44f2166052219dc7b6502dc5a8beb7fdb875aee7842f8147f99d4055accd63ce.exe
Resource
win10v2004-20230703-en
General
-
Target
44f2166052219dc7b6502dc5a8beb7fdb875aee7842f8147f99d4055accd63ce.exe
-
Size
2.5MB
-
MD5
4d2bae7dcb82b7af015c896797d4702b
-
SHA1
f9eaef47f594613af2b9db182d89e75c1cb629aa
-
SHA256
44f2166052219dc7b6502dc5a8beb7fdb875aee7842f8147f99d4055accd63ce
-
SHA512
6aa7f3e0230fd16a641883c9f83da486edc46244d297fef008ec1e43367516aa735728b907578fe8e700829b51727e51c53868b7850f733241b779f466507e20
-
SSDEEP
49152:Babi8GMS3lpeX4FLnVhJagPOUTaCrYfIU6DRgPl3G35xh7zI:MbvXkXJ7PrFYQ6lG1zI
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3960-133-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral2/memory/3960-135-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral2/memory/3960-136-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral2/memory/3960-137-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral2/memory/3960-138-0x0000000010000000-0x00000000100BE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
44f2166052219dc7b6502dc5a8beb7fdb875aee7842f8147f99d4055accd63ce.exepid process 3960 44f2166052219dc7b6502dc5a8beb7fdb875aee7842f8147f99d4055accd63ce.exe