Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 05:26
Static task
static1
Behavioral task
behavioral1
Sample
44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe
Resource
win10v2004-20230915-en
General
-
Target
44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe
-
Size
3.4MB
-
MD5
4ee1e39e0738f617cbc7333f6a7a7335
-
SHA1
6733bca61a9e215805aa244bed78278b92afc434
-
SHA256
44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6
-
SHA512
5ebf0e2dafe8b003119e01d19abcd4f9815865d067398acba9904d0fede8e078c2fdc4cf1d01541825be44d20c8d2b760ea1f6a8aed48075fdb1fb559c5bc41b
-
SSDEEP
24576:fPX8sP2feeSjW2TLSXMRv0q0usX6ST/9dzQtKP7fBItkhORnAPDR3hapJhVY2guy:fluQtlR0R3gXhKLO7zuZJt
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2956-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-20-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-24-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-26-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-36-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-38-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-46-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-44-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-42-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-40-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-34-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-32-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-22-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2956-47-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2956 44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe 2956 44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe 2956 44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe