Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe
Resource
win10v2004-20230915-en
General
-
Target
b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe
-
Size
2.2MB
-
MD5
c437c3a6895637430dc201276f24f1b9
-
SHA1
9f5a48fcf89f97ac49e7f542a2c6b9404decef15
-
SHA256
b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99
-
SHA512
d9513f1d47cec4deb0331388dca36295713896861e37483c6d928d43ae03c6315f61d0b01d4e5e9c5f7935a001645e961d7f61ea0bce5c4832dbbbe1cc2e8a76
-
SSDEEP
49152:JoGfwoGLacpDXTHLFwWLScqf78zKWxAgKYpag:bfwoG+cdvFJM7Ubafg
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2412-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2412-55-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2412 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe 2412 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe 2412 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2412 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe 2412 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe 2412 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe"C:\Users\Admin\AppData\Local\Temp\b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2412