Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 06:04
Static task
static1
Behavioral task
behavioral1
Sample
d5bf33f154836347129c1d8b62ac02ad4de6371519ea4ef8d426405dd8f47f84.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
d5bf33f154836347129c1d8b62ac02ad4de6371519ea4ef8d426405dd8f47f84.exe
Resource
win10v2004-20231023-en
General
-
Target
d5bf33f154836347129c1d8b62ac02ad4de6371519ea4ef8d426405dd8f47f84.exe
-
Size
3.8MB
-
MD5
3df5c994c5c3f22eae5dd6be829c15c5
-
SHA1
4123f460078ef70617d39f746793740cb9971ef3
-
SHA256
d5bf33f154836347129c1d8b62ac02ad4de6371519ea4ef8d426405dd8f47f84
-
SHA512
270dd6170c4e1d93fd95636e8b3b649dac11f02e1c6304600bc81174f2b8e2b0632fe7b025b66746308964d89817222f7c491c20633c3e881d7c7f516a67b7d3
-
SSDEEP
49152:1avuN+SLnkp8BiN2Fgq5q+BUczaiyRbVzW0+8HDxAQwzx6AaHPkOI4fdZiwkz:XRnkeBCUBUcRyRbVK0+Gw5sPkadZxkz
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2108-6-0x0000000002990000-0x0000000002F31000-memory.dmp upx behavioral2/memory/2108-8-0x0000000002990000-0x0000000002F31000-memory.dmp upx behavioral2/memory/2108-9-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-11-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-12-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-14-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-16-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-19-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-21-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-23-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-26-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-29-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-31-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-33-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-36-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-38-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-44-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-42-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-46-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-40-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-48-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-50-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-52-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-56-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-54-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-57-0x00000000027A0000-0x00000000027DE000-memory.dmp upx behavioral2/memory/2108-59-0x0000000002990000-0x0000000002F31000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2108 d5bf33f154836347129c1d8b62ac02ad4de6371519ea4ef8d426405dd8f47f84.exe 2108 d5bf33f154836347129c1d8b62ac02ad4de6371519ea4ef8d426405dd8f47f84.exe 2108 d5bf33f154836347129c1d8b62ac02ad4de6371519ea4ef8d426405dd8f47f84.exe