Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 01:16
Behavioral task
behavioral1
Sample
554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe
-
Size
158KB
-
MD5
3eb8c476c0abcd01fdb799de83503e12
-
SHA1
138aa012bb3b20a79aaf016af172a1b3106a7304
-
SHA256
554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986
-
SHA512
ed277e52d5348d1401a51f002e9f03bfada6481b2cab827f13fa39d54f5c42d4e4ac6627ced47f98fbc22010b044fb0d09b55c6133fc2746e9e78234975c2f85
-
SSDEEP
3072:tf/J2ULiTehI8FrkZTFieSzoSUYSziUP0ZMJG:32UL2i9FKFHd4SziUP0
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2872-0-0x0000000000400000-0x000000000046B000-memory.dmp UPX behavioral1/memory/2872-2-0x0000000000400000-0x000000000046B000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/2872-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2872-2-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exepid process 2872 554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exepid process 2872 554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe 2872 554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe"C:\Users\Admin\AppData\Local\Temp\554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx