Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
14-11-2023 13:38
Static task
static1
Behavioral task
behavioral1
Sample
a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe
Resource
win10v2004-20231023-en
General
-
Target
a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe
-
Size
3.3MB
-
MD5
d2079290b28d2a348f58b8e95c3f4a7f
-
SHA1
41c04e055376d2a532220873e247aadd32e67709
-
SHA256
a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6
-
SHA512
ca2a8054c00989c03749f699bc3058f938385057bd6864840ff2558b843531a9b08adc3ed24b953df9ef04df206d569b074bcfb57c38d149820f9b6488dd25d1
-
SSDEEP
49152:jaMupRHaphWaIDLgMp6tLewu4e3RPVJr+s8KuqGaX0ToIBAUZLYNBD:R8aIDLgMACwu4iGJBAUZLCt
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1928-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1928-47-0x0000000010000000-0x000000001003E000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 1928 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 1928 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 1928 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 1928 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 1928 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe