Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2023 19:36
Static task
static1
Behavioral task
behavioral1
Sample
40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a.exe
Resource
win10v2004-20230703-en
General
-
Target
40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a.exe
-
Size
3.2MB
-
MD5
dcd93e1a48393abdff536e2a38bd21a7
-
SHA1
c020e851c4b2688cd772be32f6d9ceaee8a57c64
-
SHA256
40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a
-
SHA512
6516d6204d93b662b8f744c80cb76d2ef1cbb206165f3c62c29b045b3454c93398ff2a29c5b27efe38be18328eddc0e9e72532f2bb897b4ca6a2a06ebc25c6ff
-
SSDEEP
49152:E5N2hVOqg1Rs3SC64cU/wy72iFE2KQRPgmmkFx/rICJsMbWo1QyV0/e:QNuOqgfw9w0QE4gtrI7AWsQc0/e
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1900-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-153-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-155-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-157-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-159-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-163-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-177-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1900 40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a.exe 1900 40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a.exe 1900 40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a.exe 1900 40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a.exe 1900 40422ab631d55ff76fb91784392bb8848e18bb774312be0a84cc7eaac5ead85a.exe