Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
4adee793fdf29fc0010bfc3097f7d5da3c7c388494ad46b442302a250c9b9499.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4adee793fdf29fc0010bfc3097f7d5da3c7c388494ad46b442302a250c9b9499.exe
Resource
win10v2004-20240426-en
General
-
Target
4adee793fdf29fc0010bfc3097f7d5da3c7c388494ad46b442302a250c9b9499.exe
-
Size
1.2MB
-
MD5
71a3601a64b4d1bfaeec4ae08de182d7
-
SHA1
85485cf8faefdac6bbdf8979ea5ea70675576f6c
-
SHA256
4adee793fdf29fc0010bfc3097f7d5da3c7c388494ad46b442302a250c9b9499
-
SHA512
f6f9f5e9349093fa300836f22f039845546ea4187cafdaa589603b99beca64493b2ad8dea68a3430cdeeb9527d8e1e7282d3f44cfecfe40693bff34da81bf2fd
-
SSDEEP
24576:1QaAfBNjFmEpitL5/gI8l6srReAJd3KhMjGZHL:1wFMZmI8FEA/3K5L
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 27 IoCs
resource yara_rule behavioral1/memory/2184-0-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-2-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-3-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-4-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-5-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-6-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-10-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-8-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-19-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-43-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-30-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-41-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-38-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-47-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-53-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-51-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-49-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-46-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-36-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-33-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-28-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-26-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-24-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-21-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-14-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-12-0x0000000010000000-0x000000001003D000-memory.dmp UPX behavioral1/memory/2184-54-0x0000000010000000-0x000000001003D000-memory.dmp UPX -
resource yara_rule behavioral1/memory/2184-0-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-2-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-3-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-4-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-5-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-6-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-10-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-8-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-19-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-43-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-30-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-41-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-38-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-47-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-53-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-51-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-49-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-46-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-36-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-33-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-28-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-26-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-24-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-21-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-14-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-12-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2184-54-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2184 4adee793fdf29fc0010bfc3097f7d5da3c7c388494ad46b442302a250c9b9499.exe 2184 4adee793fdf29fc0010bfc3097f7d5da3c7c388494ad46b442302a250c9b9499.exe 2184 4adee793fdf29fc0010bfc3097f7d5da3c7c388494ad46b442302a250c9b9499.exe