Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 15:38
Static task
static1
Behavioral task
behavioral1
Sample
6ac541e46aaf201f767d0f403258a0242104cc87426b74c2029c62dae5bc66b8.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6ac541e46aaf201f767d0f403258a0242104cc87426b74c2029c62dae5bc66b8.exe
Resource
win10v2004-20231023-en
General
-
Target
6ac541e46aaf201f767d0f403258a0242104cc87426b74c2029c62dae5bc66b8.exe
-
Size
2.4MB
-
MD5
5e8571fbb30ed437d1eb2d0c3ec07fb6
-
SHA1
d15ffd8483eac96f6d34bc94eceeaef6efb82ad1
-
SHA256
6ac541e46aaf201f767d0f403258a0242104cc87426b74c2029c62dae5bc66b8
-
SHA512
e4acccbf6b340ba21f2b2058e3bcbb992137c370578a7152360fd298a0113e0d12f958db475ec6516f53580c48ad436f64e937eaea26c0e31234d2afa1944a73
-
SSDEEP
49152:2O2DXpHmTUsB5dF7JHct36pwOLzC+fUSogsEJIWLpxXn:DPB5dF79+aJIWLr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1236-6-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-8-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-9-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-10-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-11-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-12-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-14-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-16-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-18-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-20-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-22-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-25-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-28-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-30-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-33-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-35-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-37-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-39-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-41-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-43-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-45-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-48-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-50-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-53-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-55-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-57-0x0000000002580000-0x00000000025BE000-memory.dmp upx behavioral2/memory/1236-58-0x0000000002580000-0x00000000025BE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1236 6ac541e46aaf201f767d0f403258a0242104cc87426b74c2029c62dae5bc66b8.exe 1236 6ac541e46aaf201f767d0f403258a0242104cc87426b74c2029c62dae5bc66b8.exe 1236 6ac541e46aaf201f767d0f403258a0242104cc87426b74c2029c62dae5bc66b8.exe