Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 04:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe
Resource
win7-20231020-en
4 signatures
150 seconds
General
-
Target
6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe
-
Size
15.8MB
-
MD5
0ebbe077f2750f163ab16ded296de5ec
-
SHA1
94e7774ef0b2e740f1247e57b37ee06cc455d332
-
SHA256
6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543
-
SHA512
5198b9e9d65bf6c2eeb6cb8c6b249e7637dcdc0ac0afc6e1324951f9aeea577548e555b6eeea94588e406ac0b63852a9f245c6b6615da6c7b32bf5521ce3c7ec
-
SSDEEP
393216:D5Cpyvsw0IAVH3qFkXBGgcgY0wa4/VwS:DE8vj0IAVH3qFS+X/VwS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3064-143-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx behavioral1/memory/3064-148-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx behavioral1/memory/3064-151-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx behavioral1/memory/3064-154-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx behavioral1/memory/3064-157-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx behavioral1/memory/3064-163-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx behavioral1/memory/3064-166-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx behavioral1/memory/3064-169-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx behavioral1/memory/3064-195-0x0000000003E50000-0x0000000003E8E000-memory.dmp upx -
resource yara_rule behavioral1/memory/3064-103-0x0000000002EF0000-0x0000000003CCC000-memory.dmp vmprotect behavioral1/memory/3064-106-0x0000000002EF0000-0x0000000003CCC000-memory.dmp vmprotect behavioral1/memory/3064-161-0x0000000002EF0000-0x0000000003CCC000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe 3064 6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe"C:\Users\Admin\AppData\Local\Temp\6ecccef3cd181fd17002436b1ee7010dc1f56565b9e3390bc0faf4a305167543.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3064