Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 00:40
Behavioral task
behavioral1
Sample
be72923596b2d2c2908b009220d2b47a95f6be25b02f32bf6d68242abfed2308.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
be72923596b2d2c2908b009220d2b47a95f6be25b02f32bf6d68242abfed2308.exe
Resource
win10v2004-20231020-en
General
-
Target
be72923596b2d2c2908b009220d2b47a95f6be25b02f32bf6d68242abfed2308.exe
-
Size
5.8MB
-
MD5
f136fc53d46ea10652338cd775a6aec4
-
SHA1
6fcae4f96547ad90fda0ae7079fe13431f698a1c
-
SHA256
be72923596b2d2c2908b009220d2b47a95f6be25b02f32bf6d68242abfed2308
-
SHA512
f0e49f9635965d4aad3cdcaf2b4128258fed783734e38fddee3f69b942de7c0598d463416bec54b85636d9b4d79f5343095cfe1baa0f54a670db3b7a4aa71fe1
-
SSDEEP
98304:4PmgEqB26SY/VA1aG2DloD/By8mcun6RdI9hxUrG+plBqI6b494wjq/VWON0pjES:4PSqB2s/VAkG2qFYcun/LiikBqQ9Tjcx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4736-0-0x0000000000400000-0x0000000000DC4000-memory.dmp upx behavioral2/memory/4736-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-28-0x0000000000400000-0x0000000000DC4000-memory.dmp upx behavioral2/memory/4736-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4736-53-0x0000000000400000-0x0000000000DC4000-memory.dmp upx behavioral2/memory/4736-57-0x0000000000400000-0x0000000000DC4000-memory.dmp upx behavioral2/memory/4736-58-0x0000000000400000-0x0000000000DC4000-memory.dmp upx behavioral2/memory/4736-59-0x0000000000400000-0x0000000000DC4000-memory.dmp upx behavioral2/memory/4736-64-0x0000000000400000-0x0000000000DC4000-memory.dmp upx behavioral2/memory/4736-65-0x0000000000400000-0x0000000000DC4000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4736 be72923596b2d2c2908b009220d2b47a95f6be25b02f32bf6d68242abfed2308.exe 4736 be72923596b2d2c2908b009220d2b47a95f6be25b02f32bf6d68242abfed2308.exe 4736 be72923596b2d2c2908b009220d2b47a95f6be25b02f32bf6d68242abfed2308.exe