Analysis
-
max time kernel
86s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2023 13:03
Static task
static1
Behavioral task
behavioral1
Sample
c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe
Resource
win10v2004-20231025-en
General
-
Target
c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe
-
Size
1.5MB
-
MD5
a7a2d62130bee7cd205929810386abae
-
SHA1
2515a000008cc8b17cec544f8f92fd96c341f880
-
SHA256
c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733
-
SHA512
f5fa0874cf30844a0def5ef6de94dcb999497a122e965c77b7390f5d56d7e4ec77afaa33dbdb62b597d32460edf9d10f1f79f2a068f14245d7fde7972381a00a
-
SSDEEP
24576:oq/cZDSr3nsl9ufpEJhjWkNk5ZGdwR/+vGKQU7Qku1ZKCbT67H3Wn3m7:bHgnhiZG4/uA71oaTIH3Q3i
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3504-1-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-0-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-2-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-4-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-7-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-9-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-12-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-15-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-17-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-19-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-21-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-23-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-25-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-27-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-29-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-32-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-34-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-36-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-39-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-41-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-43-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-45-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-47-0x0000000002500000-0x000000000253D000-memory.dmp upx behavioral2/memory/3504-49-0x0000000002500000-0x000000000253D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3504 c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe 3504 c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe 3504 c7e847810cddc1414cd2ae071d64aef297c8f5cafe6a5b7cf706237bb6fe8733.exe