Overview
overview
10Static
static
10ida.exe
windows7-x64
7ida.exe
windows10-2004-x64
7ida64.exe
windows7-x64
7ida64.exe
windows10-2004-x64
7idat64.exe
windows7-x64
1idat64.exe
windows10-2004-x64
1qwingraph.exe
windows7-x64
1qwingraph.exe
windows10-2004-x64
1unins000.exe
windows7-x64
7unins000.exe
windows10-2004-x64
7vcredist_x64.exe
windows7-x64
7vcredist_x64.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 12:28
Behavioral task
behavioral1
Sample
ida.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ida.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ida64.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ida64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
idat64.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
idat64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
qwingraph.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
qwingraph.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
unins000.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
unins000.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
vcredist_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
vcredist_x64.exe
Resource
win10v2004-20231222-en
General
-
Target
ida64.exe
-
Size
3.9MB
-
MD5
02ca44c85a0f4f2156f6764604f888ac
-
SHA1
e01d60ddc0dc27b33ea34ea42785a384f9876d3f
-
SHA256
8145b46c7d2775283b9966ac84ca3ff602d5e66250da9f2dfbb1abd13e12c01c
-
SHA512
1c94eadb48930b25982481e75e0b82fb1b644882ad2e85b45ca965fe79f8d3723f0fbcf065720b54c984bf9e3649fb8e590e89ed15ca77933bab619de9e044b9
-
SSDEEP
49152:4md9u5IP23N3tXoSx73CQ3mgvlCLopyE7Ct8MZh5hwqrFyryjjA62CEf7EoWAnxH:4mbMXvX0Lvt8mYdCNyGm
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/640-0-0x00007FF7316A0000-0x00007FF731A9F000-memory.dmp upx -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 640 ida64.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 640 ida64.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 640 ida64.exe