Analysis
-
max time kernel
155s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 21:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe
-
Size
4.7MB
-
MD5
adb068ed289f1ac19d8afd518c30dbe4
-
SHA1
c36aa1d2cde5309038af3fd88d8a7f3c9166aaea
-
SHA256
641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99
-
SHA512
33a1b3520f048d7a39221da3bd6e2514fa66c2db88140258ba4b110f224c9d0267de58a354f1813665f8fbdcc3e0ff767791d485d70657d9b007e7c37a8622d5
-
SSDEEP
98304:YkfZ8BjVV6058oo5Jl5lihknBR2TCzyod/:Ydt+7iuBim
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/452-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/452-48-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 452 641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 452 641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 452 641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe 452 641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe 452 641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe"C:\Users\Admin\AppData\Local\Temp\641a8e756aad995db1c4285f149e3cefc205d3b0342aa3c4ca89eb021cc20e99.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:452