Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 07:11
Behavioral task
behavioral1
Sample
13d86de442fd832c83a9fcdd7e3b25729818cc4d6fc395d015a34d07d8a461f8.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
13d86de442fd832c83a9fcdd7e3b25729818cc4d6fc395d015a34d07d8a461f8.exe
-
Size
92KB
-
MD5
035964f345b26ce3a0f888ee34ba45df
-
SHA1
9640bfe76150bfb961de7f14d63f7e35a5ad51b0
-
SHA256
13d86de442fd832c83a9fcdd7e3b25729818cc4d6fc395d015a34d07d8a461f8
-
SHA512
ea4fb6ae54573db34689cc7b00b02905c040f891039963d4be4d6c5a14ea1bcff81f6f2b3f7201ed77956f92a1bab2b54291f77401848f1899b926763869bde6
-
SSDEEP
1536:IhhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP6vry:OhzYTGWVvJ8f2v1TbPzuMsIFSHNThy+V
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 57 0.tcp.sa.ngrok.io 71 0.tcp.sa.ngrok.io 3 0.tcp.sa.ngrok.io -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4040 13d86de442fd832c83a9fcdd7e3b25729818cc4d6fc395d015a34d07d8a461f8.exe