Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
aab277f6189b95f7962598b5b0ea4e578e0c20e5a56b8dfe4242df738593e69f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aab277f6189b95f7962598b5b0ea4e578e0c20e5a56b8dfe4242df738593e69f.exe
Resource
win10v2004-20240426-en
General
-
Target
aab277f6189b95f7962598b5b0ea4e578e0c20e5a56b8dfe4242df738593e69f.exe
-
Size
1.3MB
-
MD5
ed1f43fad7bd176105007f17e9d381e4
-
SHA1
b28c3499bda7f1515aa7a2405b4078a76777db65
-
SHA256
aab277f6189b95f7962598b5b0ea4e578e0c20e5a56b8dfe4242df738593e69f
-
SHA512
7bf01c3da0ebd000d5da92d2de1eace440c0914ca1251dcbb1b5933a34e95f9995122f4c0d712cca3518b6a9cd5daa44fd719c83dc9f3bd705943158588a3f73
-
SSDEEP
24576:ViNdyQwZmJyF3CN2v68MYTxR0/5M7b+7bg7wdG3Q:VjdmAhCfdYTssbqEIr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4992-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4992-52-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4992 aab277f6189b95f7962598b5b0ea4e578e0c20e5a56b8dfe4242df738593e69f.exe 4992 aab277f6189b95f7962598b5b0ea4e578e0c20e5a56b8dfe4242df738593e69f.exe 4992 aab277f6189b95f7962598b5b0ea4e578e0c20e5a56b8dfe4242df738593e69f.exe