Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 12:16
Behavioral task
behavioral1
Sample
9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe
-
Size
6.5MB
-
MD5
21f796542459c9426e3c8f52979f8c49
-
SHA1
af0eee898a4b32cf53f1193d601e67b9a72c1c9a
-
SHA256
9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122
-
SHA512
37409c26b4a89e772695359232413c3e7a1bba1b592e53a21a395f02ba4b8caf1134488d953645e35053e41e83e6bb4c64d0773c8a725f4d7d92c5fd444fca08
-
SSDEEP
98304:9vE3A3JjcHMWo9+VwRxJVY/lrxGCPNvM+FeL8oCY45ADXbinYOdt+0GB:9vEFHMZ9MwRxGrtK+FGf45ADXQxc0C
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/780-12-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-50-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-54-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-52-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-48-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-46-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-44-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-42-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-40-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-38-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-34-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-32-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-30-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-22-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-20-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-18-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-16-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-14-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-13-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-36-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-28-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-26-0x0000000003360000-0x000000000339E000-memory.dmp upx behavioral2/memory/780-24-0x0000000003360000-0x000000000339E000-memory.dmp upx -
resource yara_rule behavioral2/memory/780-9-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-11-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-55-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-56-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-57-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-58-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-59-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-60-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-61-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect behavioral2/memory/780-62-0x0000000000400000-0x00000000010BB000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 780 9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe 780 9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe 780 9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe 780 9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 780 9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe 780 9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe 780 9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe"C:\Users\Admin\AppData\Local\Temp\9b663d25467423abed78af114d73cb63dde82c153a1f3b1b12929950c2804122.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:780