Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 04:52
Behavioral task
behavioral1
Sample
81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe
-
Size
14.8MB
-
MD5
569ba41ca54d0acf75b4781c6723c763
-
SHA1
0019e77290f4b74ddb8d7e193593dd9b72d30cdd
-
SHA256
81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30
-
SHA512
165b4d30b76bdfb159899802a2a7545a830d291807c986a4775606a0ec076381a156b549fdda3ce3da2bae5ed6aa94f87bf736abaf04d3d70b01e390d2579de9
-
SSDEEP
393216:nFi7M3wzw3l5IpZajoCqRvXlwHHeg70LR1rT2Ym:nFClw3QooLRNwmF6Ym
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/328-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/328-63-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral1/memory/328-35-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-82-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-83-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-84-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-85-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-86-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-87-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-88-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-89-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-90-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-91-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-92-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-93-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-94-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-95-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral1/memory/328-96-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 328 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe 328 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 328 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe 328 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe 328 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe"C:\Users\Admin\AppData\Local\Temp\81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:328