Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
f5c92f126c821b8555e407fe15ee79ea30db315cf8ad0e4aa2a94a2f38785a9c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f5c92f126c821b8555e407fe15ee79ea30db315cf8ad0e4aa2a94a2f38785a9c.exe
Resource
win10v2004-20230915-en
General
-
Target
f5c92f126c821b8555e407fe15ee79ea30db315cf8ad0e4aa2a94a2f38785a9c.exe
-
Size
4.5MB
-
MD5
176de22d484ad728a3671d2e20337675
-
SHA1
3eee9604f12ce22319920029c35fa5335e428926
-
SHA256
f5c92f126c821b8555e407fe15ee79ea30db315cf8ad0e4aa2a94a2f38785a9c
-
SHA512
71711f89541f666c42e21c8dc78be82c9b3940a61844de3bec1f70b30af15ce9da1e1f1cea4a978a1aa73a6dea800bcc992be56c791cbb1fe21bb1ddaaa25d3c
-
SSDEEP
98304:0+i85DcDI0XGSOFAlxyPGNa5rJBAUZLGU661rA5eo+YQ9oNsGwAYXpoTTz:0dT5OelxyeNa5rJVd1rA5eo+YQ9oNsGh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2144-1-0x0000000002850000-0x0000000002874000-memory.dmp upx behavioral2/memory/2144-11-0x0000000002850000-0x0000000002874000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2144 f5c92f126c821b8555e407fe15ee79ea30db315cf8ad0e4aa2a94a2f38785a9c.exe 2144 f5c92f126c821b8555e407fe15ee79ea30db315cf8ad0e4aa2a94a2f38785a9c.exe