Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe
Resource
win10v2004-20240426-en
General
-
Target
0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe
-
Size
2.3MB
-
MD5
2d41fa0c201377489f0fa8746e64820c
-
SHA1
bf670fc0fef4f2375ef98c195a749a839b35915e
-
SHA256
0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b
-
SHA512
4ab801b646f625b9f2f6754995e8312ccc98b2d2379f197547eec682fc7c6ef4b9fb44e3388b6a90c837699adc975c83f423d260491a9246e900b60108de3731
-
SSDEEP
24576:Es8jONh5DQwsJAyLVn3eody1VEYYUba3qwhQtLOmDbF4:NdEJt3eQwWYYUu3qaMTF4
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2428-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2428-51-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2428 0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2428 0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe 2428 0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe 2428 0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe"C:\Users\Admin\AppData\Local\Temp\0e5b2a8fa22730a65d293aff5e7357119d3c1b1b32ca69d43253e92c1671a12b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2428