Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
515bb2353d977928431b0489fcfa96a5bc9c3a89d4a90db63c26389da2a4a5dc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
515bb2353d977928431b0489fcfa96a5bc9c3a89d4a90db63c26389da2a4a5dc.exe
Resource
win10v2004-20230915-en
General
-
Target
515bb2353d977928431b0489fcfa96a5bc9c3a89d4a90db63c26389da2a4a5dc.exe
-
Size
900KB
-
MD5
e7d33b5a62aa4390bb39554f18fb5ea9
-
SHA1
4e709b4128cae9f7e87ee932d992e156cc334e01
-
SHA256
515bb2353d977928431b0489fcfa96a5bc9c3a89d4a90db63c26389da2a4a5dc
-
SHA512
10e5720bf013dda0e8b9177b9d0e42c4c0d8391070584ed6be833f9e89c0c6c77ef06a983545a74df11280330b2be3a8af2df5556b0ce2294c10b71c2f5a33c2
-
SSDEEP
12288:MGQ+G9X6RPniwF/wM6RqFF2K6ZEHKq3+yG21cAEXs3oSfl3zA5goSS:MH+ExrRQF2nEqSfG21ciBFzw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3256-1-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/memory/3256-0-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/memory/3256-3-0x0000000002440000-0x000000000244B000-memory.dmp upx behavioral2/memory/3256-4-0x0000000002440000-0x000000000244B000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3256 515bb2353d977928431b0489fcfa96a5bc9c3a89d4a90db63c26389da2a4a5dc.exe 3256 515bb2353d977928431b0489fcfa96a5bc9c3a89d4a90db63c26389da2a4a5dc.exe