Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
4e3b7a9fa22104b127c9922fa2f93d5dce587aa01fc23ec9d5b36f8e68b817a3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e3b7a9fa22104b127c9922fa2f93d5dce587aa01fc23ec9d5b36f8e68b817a3.exe
Resource
win10v2004-20240508-en
General
-
Target
4e3b7a9fa22104b127c9922fa2f93d5dce587aa01fc23ec9d5b36f8e68b817a3.exe
-
Size
1.6MB
-
MD5
d86c55bfe2e04bc72eb6170db0eda232
-
SHA1
2226552f17f7a9d92fd66c0b0bd88376ed52b84c
-
SHA256
4e3b7a9fa22104b127c9922fa2f93d5dce587aa01fc23ec9d5b36f8e68b817a3
-
SHA512
464457011c32a1b33296a075bee436c6019fc28f4cc3ace82570d449918b2af76570d742bf1d29c93e8d079e5cc63c3caf5fe2d664df58fea3db4bded63a69cb
-
SSDEEP
24576:1NApz4c2c7mEHa0WgdXCHtlObuHYknF41UJHNsxTXQOsVyiJb/BFzZnwO:DEmSa0WgYNldFXHNsu9V5rT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1980-0-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/memory/1980-3-0x0000000000C90000-0x0000000000C9B000-memory.dmp upx behavioral2/memory/1980-2-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/memory/1980-1-0x0000000000C90000-0x0000000000C9B000-memory.dmp upx behavioral2/memory/1980-4-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-23-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-11-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-9-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-6-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-39-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-51-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-50-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-47-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-45-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-44-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-37-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-35-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-33-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-31-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-29-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-27-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-25-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-21-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-19-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-17-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-15-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-13-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-8-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-7-0x00000000025D0000-0x000000000260E000-memory.dmp upx behavioral2/memory/1980-58-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral2/memory/1980-59-0x00000000025D0000-0x000000000260E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1980 4e3b7a9fa22104b127c9922fa2f93d5dce587aa01fc23ec9d5b36f8e68b817a3.exe 1980 4e3b7a9fa22104b127c9922fa2f93d5dce587aa01fc23ec9d5b36f8e68b817a3.exe 1980 4e3b7a9fa22104b127c9922fa2f93d5dce587aa01fc23ec9d5b36f8e68b817a3.exe