Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
5b3dab7ef3e7c924cc62233c66d918e4db6ae63b2e532a8c376276e2707d0013.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5b3dab7ef3e7c924cc62233c66d918e4db6ae63b2e532a8c376276e2707d0013.exe
Resource
win10v2004-20230703-en
General
-
Target
5b3dab7ef3e7c924cc62233c66d918e4db6ae63b2e532a8c376276e2707d0013.exe
-
Size
1.1MB
-
MD5
ddaa7aa8aca80c9cbeb31c46a50f6807
-
SHA1
f68d2d11eb4cdb2bf1e68f5572ec5beff44178d2
-
SHA256
5b3dab7ef3e7c924cc62233c66d918e4db6ae63b2e532a8c376276e2707d0013
-
SHA512
abc883ba9932bbeffa2a2567479c2ae4a53bb1ffbd9f3f56479263533c4f5a0d5e6c44167c6bcfcbc7b85c49129e5a5af0a3e62b9304486caaa67e46be28b7db
-
SSDEEP
24576:fZV6oN4JTHLRL8ofPpRoA2sv0sYRaXm2ZKebuQYN:fZV6oN4JxLZYA9tzXzge+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2584-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2584-45-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2584 5b3dab7ef3e7c924cc62233c66d918e4db6ae63b2e532a8c376276e2707d0013.exe 2584 5b3dab7ef3e7c924cc62233c66d918e4db6ae63b2e532a8c376276e2707d0013.exe 2584 5b3dab7ef3e7c924cc62233c66d918e4db6ae63b2e532a8c376276e2707d0013.exe