Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2023 02:21
Static task
static1
Behavioral task
behavioral1
Sample
b0ee5f07c14c0806dd028175f0810a0965f70efbb190a4ac375d1a925ac61a94.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b0ee5f07c14c0806dd028175f0810a0965f70efbb190a4ac375d1a925ac61a94.exe
Resource
win10v2004-20230915-en
General
-
Target
b0ee5f07c14c0806dd028175f0810a0965f70efbb190a4ac375d1a925ac61a94.exe
-
Size
2.2MB
-
MD5
4dbb97059ec03f7d9dda66794ac0953c
-
SHA1
a569ea5d2f5b66e7f6d3a1749acb2b9b8c8a2049
-
SHA256
b0ee5f07c14c0806dd028175f0810a0965f70efbb190a4ac375d1a925ac61a94
-
SHA512
de9ec604f9eb75b22292cea2588b5aa45670495a4ee5572dfe2a828442aaa9fcb6b79300649092c50bc7e677415d3dd359f5cdf99ea2335919b1e277aa45a848
-
SSDEEP
49152:9Y1s/ietRDAsyF71Z+s8KuqGaX0ToIBAUZLYbf:OBetCsyjSJBAUZLOf
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2740-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2740-45-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2740 b0ee5f07c14c0806dd028175f0810a0965f70efbb190a4ac375d1a925ac61a94.exe 2740 b0ee5f07c14c0806dd028175f0810a0965f70efbb190a4ac375d1a925ac61a94.exe 2740 b0ee5f07c14c0806dd028175f0810a0965f70efbb190a4ac375d1a925ac61a94.exe