Analysis
-
max time kernel
126s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 22:33
Static task
static1
Behavioral task
behavioral1
Sample
41eb543d5ad2c2e7036233b194946055bc0ad95767c09dbf2438df8143b8b295.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
41eb543d5ad2c2e7036233b194946055bc0ad95767c09dbf2438df8143b8b295.exe
Resource
win10v2004-20230915-en
General
-
Target
41eb543d5ad2c2e7036233b194946055bc0ad95767c09dbf2438df8143b8b295.exe
-
Size
1.4MB
-
MD5
f13745424ca05a3df4688cf6026fbf2d
-
SHA1
0c56baca0e25d0a05956e18d1d9f67e55a5921c5
-
SHA256
41eb543d5ad2c2e7036233b194946055bc0ad95767c09dbf2438df8143b8b295
-
SHA512
8528b4aa957cee55b3f9809f63e07c841c3240c401550e3624a3ee9e12675568e5b2fc1bdd96414256349bdbd58a0468b1aaae4e21e34693d25d3208bc243bd6
-
SSDEEP
12288:Y3+HC3OpuhWV1XaGo2ardPENtVNdDYFK3Z0/Om5ReffxOv0oanZnWYwrUDe4oyIW:VFpahPE/9p0/Om5RefJJF1W3yn
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4264-0-0x0000000180000000-0x0000000180045000-memory.dmp upx behavioral2/memory/4264-2-0x0000000180000000-0x0000000180045000-memory.dmp upx behavioral2/memory/4264-3-0x0000000180000000-0x0000000180045000-memory.dmp upx behavioral2/memory/4264-4-0x0000000180000000-0x0000000180045000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4264 41eb543d5ad2c2e7036233b194946055bc0ad95767c09dbf2438df8143b8b295.exe 4264 41eb543d5ad2c2e7036233b194946055bc0ad95767c09dbf2438df8143b8b295.exe