Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe
Resource
win10v2004-20230703-en
General
-
Target
f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe
-
Size
1.6MB
-
MD5
8d8846768ea122f9cfa29d38af05296b
-
SHA1
ffddeb6547f228dc9ef0e3d6e23f15d0eeccc7aa
-
SHA256
f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9
-
SHA512
96a5b8594c60ddcc672ff8fb550fbce2eac7cc520f05bbc5592b5a312d2d5699523e03e0bbb60043ee5a7ea600305ea3b88e9b0f830b11b9df4e210d0f2f408b
-
SSDEEP
49152:dqYRPkKjlC3xqArhiGbpm8xQTZJM2CEWFPqtScJ:dqEkBxqO/bpHV4W1qtScJ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2992-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2992-62-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2992 f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2992 f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2992 f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe 2992 f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe 2992 f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe 2992 f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe"C:\Users\Admin\AppData\Local\Temp\f9de9c3ec8a5d55617c0f25aab61204beff19f3f0efaba9cddc36dd0275e0cd9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2992