Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe
Resource
win10v2004-20231023-en
General
-
Target
a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe
-
Size
3.3MB
-
MD5
d2079290b28d2a348f58b8e95c3f4a7f
-
SHA1
41c04e055376d2a532220873e247aadd32e67709
-
SHA256
a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6
-
SHA512
ca2a8054c00989c03749f699bc3058f938385057bd6864840ff2558b843531a9b08adc3ed24b953df9ef04df206d569b074bcfb57c38d149820f9b6488dd25d1
-
SSDEEP
49152:jaMupRHaphWaIDLgMp6tLewu4e3RPVJr+s8KuqGaX0ToIBAUZLYNBD:R8aIDLgMACwu4iGJBAUZLCt
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3720-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3720-49-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3720 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 3720 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 3720 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 3720 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 3720 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe 3720 a09009a39d20c7363bf75d8be847baed1996a9319b664b4e0f803499d02921b6.exe