Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
20/11/2023, 15:05
Behavioral task
behavioral1
Sample
09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe
Resource
win7-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe
-
Size
1.4MB
-
MD5
469504c5e756fc2810012bc11ba7bf43
-
SHA1
29cef8794c70e8772710a19775f5eef293b8da6e
-
SHA256
09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0
-
SHA512
86400af1680ad66d77bdda0acec5c73e7635a9db3b91d736bfe0bfb7b39ec881a796dea138eb788d85729a7840cc9e0b21310f2e216799785d73aba0849ce63f
-
SSDEEP
24576:veIyXsTzpOMM3/cUzuWiz2Tn4A1rrnbP:vpMhuWi6TnJ1r7
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2164-0-0x0000000000400000-0x000000000055E000-memory.dmp upx behavioral1/memory/2164-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-29-0x0000000000400000-0x000000000055E000-memory.dmp upx behavioral1/memory/2164-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2164-47-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2164 09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2164 09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe 2164 09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe 2164 09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe"C:\Users\Admin\AppData\Local\Temp\09bf47f40ff0472cfbc323fe08a3981a03f563f32a2bbe5b623caea013ca0da0.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2164