Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 22:21
Behavioral task
behavioral1
Sample
698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe
-
Size
10.8MB
-
MD5
e00e056a3bda2404992af8b6a3e4322c
-
SHA1
aadd080cf952ead619a4e4964f84b7b1f7dd59b1
-
SHA256
698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b
-
SHA512
04c3136fc6143306a38d19ad21813fc3e8e60748107620418c6c18bc0969f69d6e84ee00d9ae32783bfd91669974b7b35208afbeec6fe33e6d7bc80ea5ff46cd
-
SSDEEP
196608:nF96mteVte6SqLYe+OTOgahRysUtdKjalQnlLZQENU5bm6Csv1H1t:F5ct/Ye16pksUHKjTZZUZn1/
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2992-35-0x00000000002A0000-0x0000000001A5C000-memory.dmp vmprotect behavioral1/memory/2992-39-0x00000000002A0000-0x0000000001A5C000-memory.dmp vmprotect behavioral1/memory/2992-40-0x00000000002A0000-0x0000000001A5C000-memory.dmp vmprotect behavioral1/memory/2992-41-0x00000000002A0000-0x0000000001A5C000-memory.dmp vmprotect behavioral1/memory/2992-42-0x00000000002A0000-0x0000000001A5C000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2992 698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe 2992 698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2992 698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2992 698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe 2992 698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe"C:\Users\Admin\AppData\Local\Temp\698952bb9e85dbef5b253b2561d61026d87832388b420cb91332408c95e1427b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2992