Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/08/2023, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
569d94a183de7bcb15674a7d428175c5ce20909ea0ea6684f02a8bb3f1fa7ecc.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
569d94a183de7bcb15674a7d428175c5ce20909ea0ea6684f02a8bb3f1fa7ecc.exe
Resource
win10v2004-20230703-en
General
-
Target
569d94a183de7bcb15674a7d428175c5ce20909ea0ea6684f02a8bb3f1fa7ecc.exe
-
Size
5.1MB
-
MD5
b3a9aa59612cabe241bd95fd6d1e2fa6
-
SHA1
f20dde157e958df266d5c5ba45d1f71212fb5dc6
-
SHA256
569d94a183de7bcb15674a7d428175c5ce20909ea0ea6684f02a8bb3f1fa7ecc
-
SHA512
93448b5f17677384ef6fbc60c29a261c00cca14f71c3d4c000b32fbf05cd17c9369149d7876878c19a7a34313c2a12502df4cc64cc1b08373b01996343dc542b
-
SSDEEP
98304:x1JnXM6eoUD9qjqEadfGUDOXiCUEw/RBzzR8hrAPiuxDSvAKvNO6vdnBY2DzilIh:BJIb+yAKRB+t7uxQ1sOm2QyP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2612-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-102-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2612-105-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2612 569d94a183de7bcb15674a7d428175c5ce20909ea0ea6684f02a8bb3f1fa7ecc.exe 2612 569d94a183de7bcb15674a7d428175c5ce20909ea0ea6684f02a8bb3f1fa7ecc.exe 2612 569d94a183de7bcb15674a7d428175c5ce20909ea0ea6684f02a8bb3f1fa7ecc.exe