Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 10:15
Behavioral task
behavioral1
Sample
0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exe
Resource
win10v2004-20240419-en
General
-
Target
0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exe
-
Size
1.3MB
-
MD5
a9e00b6d4710def9b4ba12f1863a9ed4
-
SHA1
6fd5134897395d91a4c999546b5d2d2b13edbc1e
-
SHA256
0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82
-
SHA512
17e28da55cca3a1a54c3ba5f7364d0815bba4abf92ea16db64aa1bf99a6020e0035361ada584a4fbacf94e5c808adb4dd737e00985740e2d11043ce102066d3c
-
SSDEEP
24576:J7UwVlkLzIenLlZQsdR4OMqR+sma7+Zk8NbxcN:JdmfnLlTb4OlR+1o+RD
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3228-0-0x0000000000400000-0x0000000000550000-memory.dmp upx behavioral2/memory/3228-20-0x0000000000400000-0x0000000000550000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exepid Process 3228 0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exe 3228 0fcfc3b736ef63d17e6f9228d55c91279130686af6d35739c3baa3f383601c82.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398KB
MD50bc7a071680abe162e84c2fbbd95da09
SHA10af7683d1f16798577afc2d20e3e9a568eb5cf2d
SHA25630217332cbe6ee39d23313cea38919a5d542faa31b957d70c387ae3f8ebf61ad
SHA5129166c26346d533f25de189e89368c8932e6d2b8422c3cf58eda2baa323cb041f83e6101020dc167d438c24968a52aa730daec7f9d21ca797f306987ac7dcdf7d