Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:53
Behavioral task
behavioral1
Sample
057f73f27d1149487a6a77760278bd685eec6cdb7888de7c1b128ad387309f2b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
057f73f27d1149487a6a77760278bd685eec6cdb7888de7c1b128ad387309f2b.exe
Resource
win10v2004-20240508-en
General
-
Target
057f73f27d1149487a6a77760278bd685eec6cdb7888de7c1b128ad387309f2b.exe
-
Size
1.7MB
-
MD5
b322fec10754aa2761fd1c69a84c24a7
-
SHA1
cc94a5eb926c5a252fe44302e0de8dbe119f34b2
-
SHA256
057f73f27d1149487a6a77760278bd685eec6cdb7888de7c1b128ad387309f2b
-
SHA512
cf87be6c870f6fad73965343b0de0a29d3fba1404a9b6c30457df2bde0968c90fa0712ad799c924f2ccd2d0e0685e1b929bc1a9b91e79368153b14d9d043bc56
-
SSDEEP
24576:uPd+dEW1pe+usy3F68DENiQmpnjIMYCti9Gp42O5y8pDGTKuMHpRFu1hcusJea71:2dOEUjuvF6H8gMZiL2O8VvAR01Bg+0
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2664-3-0x0000000000400000-0x0000000000908000-memory.dmp dropper_html behavioral2/memory/2664-2-0x0000000000400000-0x0000000000908000-memory.dmp dropper_html behavioral2/memory/2664-1-0x0000000000400000-0x0000000000908000-memory.dmp dropper_html behavioral2/memory/2664-4-0x0000000000400000-0x0000000000908000-memory.dmp dropper_html behavioral2/memory/2664-5-0x0000000000400000-0x0000000000908000-memory.dmp dropper_html behavioral2/memory/2664-7-0x0000000000400000-0x0000000000908000-memory.dmp dropper_html behavioral2/memory/2664-8-0x0000000000400000-0x0000000000908000-memory.dmp dropper_html -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
057f73f27d1149487a6a77760278bd685eec6cdb7888de7c1b128ad387309f2b.exepid process 2664 057f73f27d1149487a6a77760278bd685eec6cdb7888de7c1b128ad387309f2b.exe