Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe
Resource
win10v2004-20230915-en
General
-
Target
9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe
-
Size
6.7MB
-
MD5
95b6d07b2f9960b92d39bfed70964160
-
SHA1
4daf4e023c2766cd5d1a79add885b43c672e4a88
-
SHA256
9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416
-
SHA512
8f6b3408697accae67f076559036f742291c255316c414a98d71946541e1e9cd6aa514849ea023de69a7657843b1e3806c884c6fb23c8ddcb48278351145b381
-
SSDEEP
98304:lKwQHuaJIWLcG0uttOHEhJxzLtipGMfv2rq3aX38NA03VeESWvw77lijHJAx5SpJ:6zHL91/qqH8R31pjHugV0E
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4052-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/4052-61-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4052 9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe 4052 9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe 4052 9623a4710cb2591bcb087b7986463910584c003bb71ebee8edb7e2b4a13f7416.exe