Overview
overview
10Static
static
10ida.exe
windows7-x64
7ida.exe
windows10-2004-x64
7ida64.exe
windows7-x64
7ida64.exe
windows10-2004-x64
7idat64.exe
windows7-x64
1idat64.exe
windows10-2004-x64
1qwingraph.exe
windows7-x64
1qwingraph.exe
windows10-2004-x64
1unins000.exe
windows7-x64
7unins000.exe
windows10-2004-x64
7vcredist_x64.exe
windows7-x64
7vcredist_x64.exe
windows10-2004-x64
7Analysis
-
max time kernel
125s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 12:28
Behavioral task
behavioral1
Sample
ida.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ida.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ida64.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ida64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
idat64.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
idat64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
qwingraph.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
qwingraph.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
unins000.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
unins000.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
vcredist_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
vcredist_x64.exe
Resource
win10v2004-20231222-en
General
-
Target
ida.exe
-
Size
3.9MB
-
MD5
c9aff2f72199247db8820468312f8c7d
-
SHA1
f180195eb630bf39b3e95ca2967bf593c3cd0e16
-
SHA256
2e6d13859334f5abe205ad9d1b44e82496b0484bb29f8086e4978a8331cc3d0b
-
SHA512
b9afd1dc763cde196bbded0f127fdd46e4cab8ce42647757b91805a47ecdd3248473b886e1176ee4565c8cef3324bfb218d69ead6aae5ee3649176d1c5176a39
-
SSDEEP
49152:e+OH4UTrneOsYX71J5sktFlag4Gfdv9wjMZ7sgL2B3cCqbopA9mprW99vAz+DawF:e+GrePGGNg4xMag/6C94+bLwmD
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2204-1-0x000000013F9B0000-0x000000013FDB0000-memory.dmp upx -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2204 ida.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2204 ida.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2204 ida.exe