Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe
Resource
win10v2004-20240508-en
General
-
Target
fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe
-
Size
2.1MB
-
MD5
4e0d52ea1e2661b55e0f283aac216d4a
-
SHA1
8c8dfe06a5e913668259c2e8a34547dc16150ddb
-
SHA256
fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a
-
SHA512
61892c8fc142aec2f599bfee1e41a6331429b5321fc06a1b824aa6a101411b68dd4409c7132cddcdf813943096b794e897945949ce28eda56d1d8f185fad0845
-
SSDEEP
24576:hw7JExrHGRZCRZRTa7asHTcOcMp9tG+r2r4cX9ByEbMEGwdlzP9svYCG3P:hILbJ7asHQMpKIA3QOpVslC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3016-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3016-4-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe 3016 fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe"C:\Users\Admin\AppData\Local\Temp\fada5933a3fbb7ab860bfb1f8cd63230704f99fed44848264ef34e9f11e7973a.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3016