Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe
Resource
win10v2004-20230915-en
General
-
Target
10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe
-
Size
4.5MB
-
MD5
9b23aef038dba9da94132bce5f8b87b4
-
SHA1
58476c9ec1c08afacea0fcf64af336e2845f9486
-
SHA256
10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e
-
SHA512
c5a5822dd4d7bef710c2f2f85bb8af4b5e26372291a8359bcc91066135f5d7019b6cef02bcd64ecfa2224ffc380dfbafb7e9cbc26f30b36c741c5ad54b5d231f
-
SSDEEP
98304:TnNQjlG4cEScWPgtX2aDMyQwrBOOWkFAhdwsHETCCZ:6cEGo2arQw7WogwY0Ce
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2220 10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe 2220 10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe 2220 10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe 2220 10f03b93bbbabe6634e32cbf1708b09a7da9aedc3ff0f13624fb8d0e16d92d7e.exe