Analysis
-
max time kernel
142s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 07:19
Behavioral task
behavioral1
Sample
dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187.exe
Resource
win10v2004-20230915-en
General
-
Target
dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187.exe
-
Size
3.9MB
-
MD5
909867e0ad5547801580bd9195069aca
-
SHA1
62afbaa1106fac24f3ed6e06e84513af283f896f
-
SHA256
dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187
-
SHA512
3bd740ee09040ccfe93dc9997688e6f6ddb07a1bf03de04cc0f4858fef63bab335093914b31228a477f873ea3ec74725c6eca3c5e6b80339af7ecbc7f2e73e38
-
SSDEEP
98304:g83v0oUWq6J9GVoGuA0d6ZWXURgdkOmvHDO8TB902bo6rT++WuLuXDfFuESJ:Bv79GVoGuAi6UXl78DO8T02bBThgQx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2152-0-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-1-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-2-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-3-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-4-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-5-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-6-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-7-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-8-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-9-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-10-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-11-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-12-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-13-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-14-0x0000000000400000-0x0000000001649000-memory.dmp upx behavioral1/memory/2152-15-0x0000000000400000-0x0000000001649000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2152 dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2152 dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187.exe 2152 dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187.exe"C:\Users\Admin\AppData\Local\Temp\dc2d73d488054d9a33b18a0cc2aeeddd898c4484e8e8cf84d6e197b9b93ed187.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2152