Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-08-2023 19:31
Static task
static1
Behavioral task
behavioral1
Sample
4c3bb03b71988380ea252f91da60f369cbe86343ecf53406a44d30a0a11a3292.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4c3bb03b71988380ea252f91da60f369cbe86343ecf53406a44d30a0a11a3292.exe
Resource
win10v2004-20230703-en
General
-
Target
4c3bb03b71988380ea252f91da60f369cbe86343ecf53406a44d30a0a11a3292.exe
-
Size
13.8MB
-
MD5
1e96a096e1fc6974c41ed6bfa3e7486d
-
SHA1
6e081715ec24d6e653f5e22ba2f3c69528e72be7
-
SHA256
4c3bb03b71988380ea252f91da60f369cbe86343ecf53406a44d30a0a11a3292
-
SHA512
82aa05f60eb5c67c9007db9c8adbd6abe760db20f476fc592a1de26a2fe05fd07f3c616379992295b43cd187cb8927af9c703d671836473a7f5f2f5588f55d07
-
SSDEEP
393216:8E7//Tqmi3FRU1fB/y2HyHjycXvx0EAJVPslI62nx9:D7HTqmirU1fB/N0jydEqPMI6a
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2812-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-101-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-99-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-103-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-105-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2812-106-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2812 4c3bb03b71988380ea252f91da60f369cbe86343ecf53406a44d30a0a11a3292.exe 2812 4c3bb03b71988380ea252f91da60f369cbe86343ecf53406a44d30a0a11a3292.exe 2812 4c3bb03b71988380ea252f91da60f369cbe86343ecf53406a44d30a0a11a3292.exe