Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe
Resource
win10v2004-20231023-en
General
-
Target
526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe
-
Size
2.0MB
-
MD5
98fa7981b9ed94a8158b837de72b5e1f
-
SHA1
a98a93c3f43fa9db28575f584951cf94c27b2ab7
-
SHA256
526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa
-
SHA512
081a2c93a30451ed5de5ab8d1ca7176ffd0c0ae7e3fe5429790ce6164d4b808bf6815025caedcd70ed47bc758685387dcae6b841e889517837aee897428510a3
-
SSDEEP
24576:otN6IJ8oEByyYxJ/v1DbHCB6OsSjswfNh+uNb0W0+2+bJOHkcH/7iV6fCQMuY:ot1rBjCBhswfab+2+9OHBf3
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1752-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1752-53-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe 1752 526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1752 526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1752 526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe 1752 526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe 1752 526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe"C:\Users\Admin\AppData\Local\Temp\526a8e191c7895d3d0cdc21952dbedd90b555ea752e61b57a2862c3ae9180faa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1752