Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe
Resource
win10v2004-20230915-en
General
-
Target
9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe
-
Size
1.2MB
-
MD5
936704c92671609a4b3c2d8c59a8d8b3
-
SHA1
168a1f502909d009242c80a91c1004d05d892fdc
-
SHA256
9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f
-
SHA512
373213ac98e0d56fefa3ca83f7fb7dc70b42b7980485458a7cde92c50137311141b822b6ba9672933469afc038b37104552ee80f2cc2e9077b1cc3ddbc8ddec4
-
SSDEEP
24576:CBRs1p/A/ATcAMZa33FMZpZm/au2BbGbdfHC2CBJ:CIXcF8FYpAB2BbG85J
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2180-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-46-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2180 9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe 2180 9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe 2180 9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe