Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe
Resource
win10v2004-20240412-en
General
-
Target
829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe
-
Size
3.8MB
-
MD5
da4894fba480455a97c4d09f14e084c8
-
SHA1
199fcfcf728d0343f4dbe86f49fa1c197f91afdf
-
SHA256
829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229
-
SHA512
0f2c1a39b5f06ac1fc73a6e1103715d6537ecb892392260d6794a69cc6bebaeffda800a7c9ebf27bde93bf17974c27fec8a1b0b7d61b90fc3a2e9014c2103bb4
-
SSDEEP
49152:+D8DI/sw7bifA/RXXYHnwVoQFMB4zSJNVI86QULF146Lb8hDoLDTD6VQZ:xM/swCo/hbFqB4OVyxLX46go3TD6VQ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2492-0-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-1-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-5-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-7-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-9-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-13-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-11-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-16-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-18-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-20-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-24-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-22-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-26-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-28-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-35-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-33-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-31-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-38-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-42-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-47-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-45-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-40-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2492-48-0x0000000010000000-0x0000000010038000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2492 829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe 2492 829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe 2492 829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe 2492 829006b335b31999c9d78a621e612ca27799f140c47c19a9291e6f0a14339229.exe