Analysis
-
max time kernel
159s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 11:59
Static task
static1
Behavioral task
behavioral1
Sample
02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe
Resource
win10v2004-20231215-en
General
-
Target
02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe
-
Size
3.4MB
-
MD5
77b147eea4247d3e1eea5dc74c55367b
-
SHA1
d7d4b364664f3d1ad6f9894a5093202d205a82a5
-
SHA256
02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589
-
SHA512
cf041e6f8d48a2f02ca1c9d131682a172ffab1be09cec8ad091a7c786832ed4da597b1c6dc375f49ad36bee3fa5ec3630d93563870545b0f3d7a858036cb8312
-
SSDEEP
49152:qeckhLguoxcxRg6Lx6sYIzeP3+bJRQ3jaiyRbVzW0+8HDxAQwzx6AaHPkOI4fUX:Nh8uoxcxG6Lx6NyRbVK0+Gw5sPkak
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/864-0-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral2/memory/864-1-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral2/memory/864-3-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-4-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-5-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-11-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-9-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-7-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-15-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-13-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-18-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-21-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-30-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-32-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-36-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-34-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-45-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-43-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-41-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-47-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-49-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-50-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-39-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-38-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral2/memory/864-27-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-25-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-23-0x0000000002660000-0x000000000269E000-memory.dmp upx behavioral2/memory/864-59-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral2/memory/864-60-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral2/memory/864-61-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral2/memory/864-62-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral2/memory/864-63-0x0000000002660000-0x000000000269E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 864 02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe 864 02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe 864 02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe 864 02525ccbc24ef21bd6162505262ce8dc34fbfd61d5444e25f69495987e65e589.exe