Analysis
-
max time kernel
128s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe
Resource
win10v2004-20230703-en
General
-
Target
1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe
-
Size
8.1MB
-
MD5
579660d90ab47d09a77e672e04f33016
-
SHA1
1890da1416a222133e11739602ff2eb0d6f7f454
-
SHA256
1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7
-
SHA512
d5a6c608044524e69986f88449bbcb173a11a13f8fefd6e9585754e4e93172a4415347afc8f83ffe88d5d0bd9fb6a11cc7c1a3a0ee18d08ba01f5d401e2e421b
-
SSDEEP
98304:tQupufecsOlG4GxUYGQQpn0woKNPMTHTIp+GpCigyQuXZcyrEH+tUr8XEiS8Ezf4:6upu8WQ4nnPIHXG1rSyrElqSnuTn
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3700-2-0x0000000002F20000-0x0000000002F56000-memory.dmp upx behavioral2/memory/3700-6-0x0000000002F20000-0x0000000002F56000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe 3700 1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe"C:\Users\Admin\AppData\Local\Temp\1d361546bc30dbe1fdbb5e41ae7289078ca5101e96ec43d00dfa07d2060129e7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3700