Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
0fba80d5ba643bf9ba595ddf6c92ce2859d91a3c61212cc98cdd684f7aa312bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fba80d5ba643bf9ba595ddf6c92ce2859d91a3c61212cc98cdd684f7aa312bb.exe
Resource
win10v2004-20231215-en
General
-
Target
0fba80d5ba643bf9ba595ddf6c92ce2859d91a3c61212cc98cdd684f7aa312bb.exe
-
Size
1.8MB
-
MD5
fbc9ba3e1d61fe2134308f5465e45cf7
-
SHA1
4020c4751561c666c524ffa86b7ad282bbd78794
-
SHA256
0fba80d5ba643bf9ba595ddf6c92ce2859d91a3c61212cc98cdd684f7aa312bb
-
SHA512
719483e77a31c2aafdfdd07dc978984801f2d46533cefe9eec32d938386749269137a8beff6706c6a82a56d6d0efe079c223a4a97e2da11db1b6a064e030ffa9
-
SSDEEP
49152:644te40rA6bGI9FIzqxUimYU097d8+b6czmGY7/Z3zCxC:676A6bbe+thd8+b6czmGyZB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1140-27-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/memory/1140-29-0x00000000033C0000-0x00000000033CB000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1140 0fba80d5ba643bf9ba595ddf6c92ce2859d91a3c61212cc98cdd684f7aa312bb.exe 1140 0fba80d5ba643bf9ba595ddf6c92ce2859d91a3c61212cc98cdd684f7aa312bb.exe