Analysis
-
max time kernel
27s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 21:07
Static task
static1
Behavioral task
behavioral1
Sample
03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe
Resource
win10v2004-20230703-en
General
-
Target
03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe
-
Size
1008KB
-
MD5
a0d38eba78e40a75062aaee851ce0736
-
SHA1
ed08545fe30260fa31395987b2e47498e732f201
-
SHA256
03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde
-
SHA512
dc3098ceb2886b21d33b8739f4eab97eb9d1f51a6e808a2e6ea0a24b870d2f631a3ccd7f21c1543ca31819674c1bd0982a76bf231d3449363a5554e5b3376ab4
-
SSDEEP
12288:FTk242zweAmpc3rBs53qugxBywpnj5wX/sj92tbVRVhXR5nWFpPoSfgUFr/RFkI+:FT1zRDpEr656JxBywpnjqPRtyb1RJ1a
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2332-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2332-97-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2332 03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2332 03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe 2332 03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe 2332 03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe 2332 03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe"C:\Users\Admin\AppData\Local\Temp\03d1ccb2ae562c3c14549539a41813b9903a46d7942a7718dd591e46f6d53fde.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332