Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 05:48
Static task
static1
Behavioral task
behavioral1
Sample
9d96bb3384a21744a45c2c3115b28feb986c0cfc9f8d6c970e13169d6e1ab1c8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9d96bb3384a21744a45c2c3115b28feb986c0cfc9f8d6c970e13169d6e1ab1c8.exe
Resource
win10v2004-20230703-en
General
-
Target
9d96bb3384a21744a45c2c3115b28feb986c0cfc9f8d6c970e13169d6e1ab1c8.exe
-
Size
3.8MB
-
MD5
1ab4ba600b443ccf57f07e0d7824ccee
-
SHA1
bafb60dda42153840135d7ef0dbc94cd82f3e87b
-
SHA256
9d96bb3384a21744a45c2c3115b28feb986c0cfc9f8d6c970e13169d6e1ab1c8
-
SHA512
14dce5c19db95ab850b6445f3c41c6b05a8e651c9d1b15428ad35b1b6ddb9630e24f409792580a37cacb8fff7996c0efd7d0e54dc00ddb0dcf466b4402d4c5ea
-
SSDEEP
49152:RUiOCsBR8F1+35nr2s7i6eiYO7oqYtd2bi7+zNedFinZBH1Whj9VfwJsCVWVS/ct:35i+fenH9+x
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/992-135-0x0000000002690000-0x000000000269B000-memory.dmp upx behavioral2/memory/992-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-140-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-142-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-148-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-150-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-160-0x0000000002690000-0x000000000269B000-memory.dmp upx behavioral2/memory/992-161-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-165-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-167-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-169-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-171-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-173-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-175-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-177-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-179-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-181-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-183-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-185-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/992-186-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 992 9d96bb3384a21744a45c2c3115b28feb986c0cfc9f8d6c970e13169d6e1ab1c8.exe 992 9d96bb3384a21744a45c2c3115b28feb986c0cfc9f8d6c970e13169d6e1ab1c8.exe 992 9d96bb3384a21744a45c2c3115b28feb986c0cfc9f8d6c970e13169d6e1ab1c8.exe 992 9d96bb3384a21744a45c2c3115b28feb986c0cfc9f8d6c970e13169d6e1ab1c8.exe