Analysis
-
max time kernel
2s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 23:18
Behavioral task
behavioral1
Sample
e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e.exe
Resource
win10v2004-20230703-en
General
-
Target
e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e.exe
-
Size
699KB
-
MD5
fd402015eb839f983f85cdcb8a55f902
-
SHA1
b652980af66171efd4c6a7abaecc6cc4a108bc39
-
SHA256
e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e
-
SHA512
8f16351baa00e28cba8de8ccdbd779686cfcc358edd292413a7822e4b491a917f919bbe6aefa8e473decc35a167732bd8a10b391370f1c7c1e5b4fc3e273bdf6
-
SSDEEP
12288:Op+yEpu7UjHi0yww00O+FHjPx3Qtc1efXclHXn728d4SAteBXeoZOTbjXfCtMoSD:lvu4j/ywwdB1Qy1wc17t4DtShZ6bratS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3240-0-0x0000000000400000-0x00000000005C3000-memory.dmp upx behavioral2/memory/3240-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-25-0x0000000000400000-0x00000000005C3000-memory.dmp upx behavioral2/memory/3240-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3240-35-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3240 e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e.exe 3240 e2dcef2a98aed444db68109c6c757f785b7176f9c3069b1fee38c8efbbc5088e.exe