Analysis
-
max time kernel
159s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 05:26
Static task
static1
Behavioral task
behavioral1
Sample
44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe
Resource
win10v2004-20230915-en
General
-
Target
44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe
-
Size
3.4MB
-
MD5
4ee1e39e0738f617cbc7333f6a7a7335
-
SHA1
6733bca61a9e215805aa244bed78278b92afc434
-
SHA256
44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6
-
SHA512
5ebf0e2dafe8b003119e01d19abcd4f9815865d067398acba9904d0fede8e078c2fdc4cf1d01541825be44d20c8d2b760ea1f6a8aed48075fdb1fb559c5bc41b
-
SSDEEP
24576:fPX8sP2feeSjW2TLSXMRv0q0usX6ST/9dzQtKP7fBItkhORnAPDR3hapJhVY2guy:fluQtlR0R3gXhKLO7zuZJt
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1376-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-44-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/1376-45-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1376 44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe 1376 44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe 1376 44b1c2e0e70ed0b13f28e923d4176a7262660b9d571c58335a2e99a8b8ac82b6.exe