Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe
Resource
win10v2004-20240508-en
General
-
Target
2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe
-
Size
2.1MB
-
MD5
dee466af8361831aa636a87f41209b8f
-
SHA1
dd819646eadeddd27e3858133c0c17b0966585d5
-
SHA256
2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2
-
SHA512
58a9044299e79fc2e68117b69670d3a18a2811c98e3551ac817aff04597d9587907c60726e946cf8963f0728b4dffdb24b54022d3183fb33500a1c3d8b4fabed
-
SSDEEP
49152:YwK7UQ+AMBAIbg2/qRx3eIdyhOlyd/HAg7cN4VGMccdwNc:YlIl7bfix3bwhvPx4NyGM/dwNc
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1740-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1740-6-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1740 2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe 1740 2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe 1740 2d0ad2c0a6a4024938c6151af1c8818251641e53644aca7234e6c673cfa32bf2.exe