Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 03:31
Behavioral task
behavioral1
Sample
f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe
-
Size
10.0MB
-
MD5
80f39688ac459add5b690b6a816df50c
-
SHA1
3e288196c48b2c43829012195fcfc254ae7ea9c2
-
SHA256
f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803
-
SHA512
33ab5ce3557e74e2791a3a8f1bb9e27acac5536dad5b977a3cb80c34743a631bfd2c9c383d0ea2a0c3fb7fac84a6d0dd579f5756aee114cc2cf910d0f0a3c269
-
SSDEEP
196608:UTkXAlOY+4/GVwHX6x3H2sH1/aov4Yrs9YVyLITT8fd:UTkXKBJ/Sw3GGs4QJs9YVyLInq
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4420-0-0x0000000000400000-0x0000000001172000-memory.dmp upx behavioral2/memory/4420-10-0x0000000000400000-0x0000000001172000-memory.dmp upx -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe 4420 f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe"C:\Users\Admin\AppData\Local\Temp\f8f0f07765f18642a3169936b5ef3c50d7995f8c0833d7e2350c124bcc587803.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4420