Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-11-2023 19:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe
Resource
win7-20231020-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe
Resource
win10v2004-20231025-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe
-
Size
1.7MB
-
MD5
6af34949ecf6311da62c51a20bed7d8a
-
SHA1
3ad6ae963e116c7872924b2d81621f45560ef14a
-
SHA256
fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83
-
SHA512
f7246e14096693761fb746075f63edc6b2ab79cafd5205908e08ad4db0592616029b556802b29fdf2b04ec6b2258595f6313678d29f39e5d42512e698f3e9225
-
SSDEEP
49152:50zuxbNwycAJJRu7ZURaMMulbkuMY4kCwNQs:au9m2JkZqkulbkkCw
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2180-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2180-61-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\TestLF.dll fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe File created C:\Windows\SysWOW64\Base.dll fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe File created C:\Windows\SysWOW64\libeay32.dll fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2180 fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2180 fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe 2180 fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe 2180 fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe"C:\Users\Admin\AppData\Local\Temp\fbf80eb90f6365d51e0aeb48be77b0ab5ef7d93d0f006ecb02fec1190dea5c83.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2180