Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe
Resource
win10v2004-20240426-en
General
-
Target
4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe
-
Size
14.7MB
-
MD5
236e5b419ae1b3850791af6565486386
-
SHA1
09780d4bdfde8f6f754be3b8158d5ebc7cade4b6
-
SHA256
4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3
-
SHA512
bd19a823617cdc98d3bfbda705de24c62733d628883cad20ed7ee2f36b1bfcbc348b19e74e2bd03bcf8a2ed439b8fcd54f30222f316e788120ead7041eca001f
-
SSDEEP
393216:oKXNTkcyPOQYFXuGlwC6v1IGAUqu7rk/QuNmuipAAAEHfQDW:oKacyPOQYFeMwC6yGAfgrSr
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2032 4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe 2032 4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe 2032 4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2032 4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe 2032 4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe"C:\Users\Admin\AppData\Local\Temp\4d3af1ed8aaedcf801e5def945610b6250d1c1344e0bada32648cd4624f3a2b3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2032