Analysis
-
max time kernel
127s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 08:56
Behavioral task
behavioral1
Sample
57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe
Resource
win10v2004-20230703-en
3 signatures
150 seconds
General
-
Target
57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe
-
Size
2.2MB
-
MD5
85e4a2e89ea63ef5f7efc216ad3fa0d5
-
SHA1
d6fd614b9fc2ed36e980e69ccd0b49293ac76e39
-
SHA256
57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea
-
SHA512
aed83433425f785a774d9b5d9173de6ae4df5e1c0bc9ce239fb0a04535a3bda9997af7b8506a0df5ea0abadb3c9432bf8f86768308d51925d1ba947505b4f55b
-
SSDEEP
49152:kj8+v+BCMbV4YDM4OgQ5s7XwMgfF8Fg/7H4IIunl/x:kjNLWALXKu
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2692-133-0x0000000000400000-0x00000000008B3000-memory.dmp vmprotect behavioral2/memory/2692-135-0x0000000000400000-0x00000000008B3000-memory.dmp vmprotect behavioral2/memory/2692-140-0x0000000000400000-0x00000000008B3000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe 2692 57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe 2692 57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe"C:\Users\Admin\AppData\Local\Temp\57cf40adfc36ca189e4a7a535ec42cf136ac6dd514c6247fdd008c9ea456c1ea.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2692