Analysis
-
max time kernel
174s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 02:51
Static task
static1
Behavioral task
behavioral1
Sample
9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe
Resource
win10v2004-20230915-en
General
-
Target
9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe
-
Size
1.2MB
-
MD5
936704c92671609a4b3c2d8c59a8d8b3
-
SHA1
168a1f502909d009242c80a91c1004d05d892fdc
-
SHA256
9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f
-
SHA512
373213ac98e0d56fefa3ca83f7fb7dc70b42b7980485458a7cde92c50137311141b822b6ba9672933469afc038b37104552ee80f2cc2e9077b1cc3ddbc8ddec4
-
SSDEEP
24576:CBRs1p/A/ATcAMZa33FMZpZm/au2BbGbdfHC2CBJ:CIXcF8FYpAB2BbG85J
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1996-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1996-45-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1996 9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe 1996 9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe 1996 9e1bca44d459e3c827691778496ad63e6f352e87c1e897e3a7a2b4100ed08f9f.exe