Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
20/11/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009.exe
Resource
win10v2004-20231020-en
General
-
Target
7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009.exe
-
Size
8.0MB
-
MD5
c88cc76b308f1d1d2672e99b1c021fdd
-
SHA1
55f1d445dc787615ea3ae386d8d8729088e92e5b
-
SHA256
7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009
-
SHA512
7579f0e4420baa0d76741b42e30ae31c29492924120202025f56df29674d533af2498a6d4b2440a3f64b2483fd16c07e7828f5ef581eaf6a52c2a476003d9081
-
SSDEEP
49152:IWreF4S6Jsm/5cAnemqPjkhRYJA6e1rnYnl:1A4S6Jsm/5cAemgNJA6e1rnYl
Malware Config
Signatures
-
Downloads MZ/PE file
-
resource yara_rule behavioral1/memory/2580-0-0x0000000010000000-0x0000000010013000-memory.dmp upx behavioral1/memory/2580-1-0x0000000010000000-0x0000000010013000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main 7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2580 7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009.exe 2580 7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009.exe 2580 7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009.exe 2580 7407d3e3ac7c78afda8aa7372ec68f51d29cf22fd81c949a161db8385c743009.exe