Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 01:55
Behavioral task
behavioral1
Sample
cc3e4194b600ae3c617f341f88b1219536d418d5d085abc3498e20dc94cfff13.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
cc3e4194b600ae3c617f341f88b1219536d418d5d085abc3498e20dc94cfff13.exe
Resource
win10v2004-20231023-en
General
-
Target
cc3e4194b600ae3c617f341f88b1219536d418d5d085abc3498e20dc94cfff13.exe
-
Size
1012KB
-
MD5
30f566f2aa84115793eb27a943038ade
-
SHA1
75a4a37a432715abd7cc77cbdf2c049830e7082d
-
SHA256
cc3e4194b600ae3c617f341f88b1219536d418d5d085abc3498e20dc94cfff13
-
SHA512
1dddedc4bd0ebfa9fd3df44335c26742db520c0eff73c2e2299ca97389525da647dddf90e0ce85de858764c439fa27cfcff7bf0e30b9e3bbc7059b549da48136
-
SSDEEP
12288:VsHeqj+wMCLOO97UpnsdJfDxLqzbf3OFg/S11Sn0cXplt11BC+qoSikVYQLOO4pb:VBs+ZCLjU6vDxLq3fOFh7AtU+pCOO4p
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2200-0-0x0000000000400000-0x000000000066D000-memory.dmp upx behavioral2/memory/2200-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-28-0x0000000000400000-0x000000000066D000-memory.dmp upx behavioral2/memory/2200-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2200-51-0x0000000000400000-0x000000000066D000-memory.dmp upx behavioral2/memory/2200-52-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2200 cc3e4194b600ae3c617f341f88b1219536d418d5d085abc3498e20dc94cfff13.exe 2200 cc3e4194b600ae3c617f341f88b1219536d418d5d085abc3498e20dc94cfff13.exe 2200 cc3e4194b600ae3c617f341f88b1219536d418d5d085abc3498e20dc94cfff13.exe