Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 04:52
Behavioral task
behavioral1
Sample
81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe
-
Size
14.8MB
-
MD5
569ba41ca54d0acf75b4781c6723c763
-
SHA1
0019e77290f4b74ddb8d7e193593dd9b72d30cdd
-
SHA256
81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30
-
SHA512
165b4d30b76bdfb159899802a2a7545a830d291807c986a4775606a0ec076381a156b549fdda3ce3da2bae5ed6aa94f87bf736abaf04d3d70b01e390d2579de9
-
SSDEEP
393216:nFi7M3wzw3l5IpZajoCqRvXlwHHeg70LR1rT2Ym:nFClw3QooLRNwmF6Ym
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5020-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/5020-12-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/5020-11-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-56-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-57-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-13-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-58-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-59-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-60-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-61-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-62-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-63-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-64-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-65-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-66-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-67-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-68-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-69-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-70-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-71-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-72-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-73-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-74-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-75-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-76-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-77-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-78-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-79-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-80-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-81-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-82-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-83-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-84-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect behavioral2/memory/5020-85-0x0000000000400000-0x0000000001ED2000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5020 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe 5020 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe 5020 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe 5020 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5020 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe 5020 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe 5020 81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe"C:\Users\Admin\AppData\Local\Temp\81381724a518478dbc6d08b6e005c297e3d5a9a1b3f7659f4a2d65d70dcd4f30.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5244 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:4068