Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23-09-2023 02:58
Behavioral task
behavioral1
Sample
a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
General
-
Target
a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe
-
Size
12.7MB
-
MD5
9444075b246f9dea48bb792538a5c7e4
-
SHA1
480006e2975d896f0d2cee0e0f8f3420e4a2b685
-
SHA256
a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55
-
SHA512
f41126270d47d5c4fea1f339d022cfca782d2f0f1aa6de63c6f4cd2f7dc125575c1ce7d4e935e0540a9450c3870c8531d795c7f4d7cf4ff83f0c16832ee25a03
-
SSDEEP
393216:MLECT6ZwZv+6aDDQnje2lt+ttbcknEP72yyo:MLECuALUQnjepMknE6y
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2412-40-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2412-41-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2412-42-0x0000000003DE0000-0x0000000004381000-memory.dmp upx behavioral1/memory/2412-43-0x0000000003DE0000-0x0000000004381000-memory.dmp upx behavioral1/memory/2412-44-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2412-45-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2412-46-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2412-47-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2412-48-0x0000000003DE0000-0x0000000004381000-memory.dmp upx behavioral1/memory/2412-52-0x0000000010000000-0x00000000105A1000-memory.dmp upx -
resource yara_rule behavioral1/memory/2412-5-0x0000000000400000-0x0000000001CCB000-memory.dmp vmprotect behavioral1/memory/2412-50-0x0000000000400000-0x0000000001CCB000-memory.dmp vmprotect behavioral1/memory/2412-51-0x0000000000400000-0x0000000001CCB000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2412 a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe 2412 a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe 2412 a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe 2412 a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2412 a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe 2412 a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe"C:\Users\Admin\AppData\Local\Temp\a14fa5213503eea57c993ec7db09625d1a46fa7c4ebf0b6f161017938b5f5e55.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2412