Analysis
-
max time kernel
153s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 08:13
Static task
static1
Behavioral task
behavioral1
Sample
d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe
Resource
win10v2004-20230915-en
General
-
Target
d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe
-
Size
3.9MB
-
MD5
7468144cd79e3e8b2523c6bc961c41ec
-
SHA1
f672f49081e94ad66aae3176d2137599c287a622
-
SHA256
d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b
-
SHA512
583d8e1f1839189b1d85dce9c80314f0061a37470bae88b3ac582443e2998ae621cd5df7ff483ed7849c552676a8f9567395d6cf8301fb224235ccc6204d5aa5
-
SSDEEP
49152:AHPVlvC7NXhb4N/P8VioBDx1nq+s8KuqGaX0ToIBAUZLYbEn3+s8KuqGaX0ToIBR:QdhC7NxMFOioBVZ5JBAUZLWJBAUZLUDS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1772-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1772-47-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1772 d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe 1772 d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe 1772 d9b37563fb49d9d74fb89b1c14dd35480054ec6e86c72c7582560a026890817b.exe