Analysis
-
max time kernel
221s -
max time network
239s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe
Resource
win10v2004-20230915-en
General
-
Target
b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe
-
Size
2.2MB
-
MD5
c437c3a6895637430dc201276f24f1b9
-
SHA1
9f5a48fcf89f97ac49e7f542a2c6b9404decef15
-
SHA256
b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99
-
SHA512
d9513f1d47cec4deb0331388dca36295713896861e37483c6d928d43ae03c6315f61d0b01d4e5e9c5f7935a001645e961d7f61ea0bce5c4832dbbbe1cc2e8a76
-
SSDEEP
49152:JoGfwoGLacpDXTHLFwWLScqf78zKWxAgKYpag:bfwoG+cdvFJM7Ubafg
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/208-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/208-53-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 208 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe 208 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe 208 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 208 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe 208 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe 208 b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe"C:\Users\Admin\AppData\Local\Temp\b6b0c336e1c7f544c5082398e69123dc779a68904185b193fc1559a60442fe99.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:208