Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2023, 12:03
Behavioral task
behavioral1
Sample
1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe
-
Size
14.6MB
-
MD5
4387a69a0180e694e5acc50387c3433e
-
SHA1
6fe40214dee24ae46020493640758642c6c26d6a
-
SHA256
1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b
-
SHA512
a6263c08654f032976f4235af3e0c410c3c1d019b4e4bf0d65aaa5d26694d5985526c9407139fdaa12447362718daeef053a57772b2afe91b8b5da3fa10d3936
-
SSDEEP
393216:9S72FNUgmlXmOYKmNw0J1wurdgCI19EJ/zc0zZoKUr3OQcd0:Uy4gMiw0JTgCy6Bz4Td
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4676-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4676-60-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/4676-4-0x0000000000400000-0x0000000001E85000-memory.dmp vmprotect behavioral2/memory/4676-28-0x0000000000400000-0x0000000001E85000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4676 1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe 4676 1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe 4676 1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe 4676 1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4676 1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe 4676 1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe 4676 1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe"C:\Users\Admin\AppData\Local\Temp\1f1c177ce563b22933375ed0278e6cd59197f761cf2173537ac67575e06c023b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4676