Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:12
Static task
static1
Behavioral task
behavioral1
Sample
f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe
Resource
win10v2004-20230915-en
General
-
Target
f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe
-
Size
4.7MB
-
MD5
402dc1b39de60770aaf7dce551e8c06c
-
SHA1
eaa580fa659aff2f604b1bb6beeff410d1591fbf
-
SHA256
f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16
-
SHA512
3a2cdbe5f2d02c552d6ecfb21a3353d3c735316737be091029bd2496800946d04e82808ed59b3efdb441d130bb47bfa0a139fe55dc2119e0460da0826685fa3f
-
SSDEEP
49152:1Khd71yww1Fz9b3WE2RnYUuWkvrTZC89vmooZ3mmVh3frOI:OdRn/IrTZ59u/3V37
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1916-1-0x0000000003730000-0x0000000003756000-memory.dmp upx behavioral2/memory/1916-0-0x0000000003730000-0x0000000003756000-memory.dmp upx behavioral2/memory/1916-3-0x0000000003760000-0x0000000003786000-memory.dmp upx behavioral2/memory/1916-4-0x0000000003730000-0x0000000003756000-memory.dmp upx behavioral2/memory/1916-5-0x0000000003760000-0x0000000003786000-memory.dmp upx behavioral2/memory/1916-7-0x0000000003760000-0x0000000003786000-memory.dmp upx behavioral2/memory/1916-6-0x0000000003730000-0x0000000003756000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1916 f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe 1916 f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1916 f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe 1916 f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe 1916 f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe"C:\Users\Admin\AppData\Local\Temp\f0a04eadae9fffb3a585bbaa807809b317c1b86a00b2e18e3bddfd5cb2278c16.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1916