Analysis
-
max time kernel
142s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
50cf5d172624cd1441f97b12a389782f96a52a2ccac863550f2ffb085f46e244.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
50cf5d172624cd1441f97b12a389782f96a52a2ccac863550f2ffb085f46e244.exe
Resource
win10v2004-20231023-en
General
-
Target
50cf5d172624cd1441f97b12a389782f96a52a2ccac863550f2ffb085f46e244.exe
-
Size
1.8MB
-
MD5
752bc263f3f073eb0f485b7d8ecc85a5
-
SHA1
0dd665c1e448b5d4a3d7460f09980db10cffc9e3
-
SHA256
50cf5d172624cd1441f97b12a389782f96a52a2ccac863550f2ffb085f46e244
-
SHA512
32324aef6fd1a48e2133de6b6fa1ef4cdd523c865b723ee79704fb4b71fdc7ef9de0152c8d2813695adb898d44a1e515decdb64081cb68c867e9de36f1b2967d
-
SSDEEP
24576:Vc/6FnnzOf89abKtH4TFz7MqwkIFh89Gfc0F2b9c2oFT/Dg8fO0000000000000U:Vfqf8RmTFUqwHFW9x0AKbi8GvtvROEU4
Malware Config
Signatures
-
Downloads MZ/PE file
-
resource yara_rule behavioral2/memory/2712-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2712-61-0x0000000000B80000-0x0000000000C3E000-memory.dmp upx behavioral2/memory/2712-64-0x0000000000B80000-0x0000000000C3E000-memory.dmp upx behavioral2/memory/2712-65-0x0000000000B80000-0x0000000000C3E000-memory.dmp upx behavioral2/memory/2712-63-0x0000000000B80000-0x0000000000C3E000-memory.dmp upx behavioral2/memory/2712-66-0x0000000000B80000-0x0000000000C3E000-memory.dmp upx behavioral2/memory/2712-70-0x0000000000B80000-0x0000000000C3E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2712 50cf5d172624cd1441f97b12a389782f96a52a2ccac863550f2ffb085f46e244.exe 2712 50cf5d172624cd1441f97b12a389782f96a52a2ccac863550f2ffb085f46e244.exe 2712 50cf5d172624cd1441f97b12a389782f96a52a2ccac863550f2ffb085f46e244.exe