Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2023, 08:40
Behavioral task
behavioral1
Sample
62456d25e43ca60a3c6763d68a70b39d09138b56b287a40f95584b563ac5bb11.exe
Resource
win7-20230712-en
3 signatures
150 seconds
General
-
Target
62456d25e43ca60a3c6763d68a70b39d09138b56b287a40f95584b563ac5bb11.exe
-
Size
488KB
-
MD5
5eee3a0ad165707b2a51db0b461eeb1e
-
SHA1
0c2ed9b0a6762d363328ece108e20a4cb2101b8e
-
SHA256
62456d25e43ca60a3c6763d68a70b39d09138b56b287a40f95584b563ac5bb11
-
SHA512
e31e4b1f0ab658d12bdc3eb8ec4760eaf320f247cfeae4d5d659a94973bb57eed812b3a895968cbb69c4af6aa9bed46afa43b2d1dddd521d58fb1d8e34b02209
-
SSDEEP
12288:C96BEnIHYA+2t3xny0I4d2Nqnp4vRqMr/jYKkJj6GmZU:xB0ZAcTInp4vcEYb6nZ
Malware Config
Extracted
Family
darkcloud
Attributes
- email_from
- email_to
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2344 62456d25e43ca60a3c6763d68a70b39d09138b56b287a40f95584b563ac5bb11.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2344 62456d25e43ca60a3c6763d68a70b39d09138b56b287a40f95584b563ac5bb11.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62456d25e43ca60a3c6763d68a70b39d09138b56b287a40f95584b563ac5bb11.exe"C:\Users\Admin\AppData\Local\Temp\62456d25e43ca60a3c6763d68a70b39d09138b56b287a40f95584b563ac5bb11.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2344