Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe
Resource
win10v2004-20230703-en
General
-
Target
92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe
-
Size
4.1MB
-
MD5
ac8651573d2722142be084bfb7191fdb
-
SHA1
6eb66f37f80ae9a428afb334584633c05deb0d47
-
SHA256
92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0
-
SHA512
24599be4f23b5b86791dde9a19f15332c4f89f420f8674745ff6fff417662027c7432d801a0191e43aa284aeb8a071b29807bea25a5d8d7fb537fe5b33c737b0
-
SSDEEP
49152:jVj+f70QAvdbT2J93pjmOV67dydbRQwEkXee4R/YfD+s8KuqGaX0ToIBAUZLYNy:4T0QAv4pjmj5gE9fBJBAUZL3
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 228 92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe -
resource yara_rule behavioral2/memory/228-139-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-143-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-145-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-147-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-144-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-142-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-149-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-151-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-153-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-155-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-157-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-159-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-161-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-165-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-167-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-170-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-172-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-174-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-176-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-178-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-180-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-182-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-184-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-186-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-188-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-190-0x0000000004380000-0x00000000043BE000-memory.dmp upx behavioral2/memory/228-191-0x0000000004380000-0x00000000043BE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 228 92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe 228 92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe 228 92fa8c33ec5477f378bce238fb7796081cf23ac2e7a39c0e782e1d635e6ca5b0.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5f581898b2ff51c2ccca11993b693c628
SHA1f3477f50a088579c7d132e7846848b4196b4f488
SHA2564f612169a241a06e8a910fe2ecad6190e0958da0128d29b335064e68611aa26f
SHA51208bb46a2cbcf8afd4222f57cc92cf10defb2639e850b7043cb3ccf5f67546567069004e31205ae9f8c52fe9816a3c6963b96b946121fc500c89925246de43294
-
Filesize
177KB
MD5f581898b2ff51c2ccca11993b693c628
SHA1f3477f50a088579c7d132e7846848b4196b4f488
SHA2564f612169a241a06e8a910fe2ecad6190e0958da0128d29b335064e68611aa26f
SHA51208bb46a2cbcf8afd4222f57cc92cf10defb2639e850b7043cb3ccf5f67546567069004e31205ae9f8c52fe9816a3c6963b96b946121fc500c89925246de43294