Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 03:56
Behavioral task
behavioral1
Sample
7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe
Resource
win7-20240611-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe
-
Size
10.4MB
-
MD5
8a8b7f6117757320777ec089def391f2
-
SHA1
8a69c04dbe7342cd5c8b5d20fc23b016d340c3d9
-
SHA256
7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b
-
SHA512
e58cd2c163a9ca75d86c6417e372501d3bf65156b977d663fc4dcbc966f814da5d76d3e5e1e2c3e229af5d8e1c57219f7619abdb2fa77726c59b58af22442326
-
SSDEEP
196608:AhHIlLJ0cfhj1gRRTocOcJz1b6C1TrQUSs1MG:ABkLJ08hjqXTVOcHb6C1TuLG
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1616-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1616-34-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/1616-3-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-12-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-14-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-57-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-58-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-59-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-60-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-61-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-62-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-63-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-64-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-65-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-66-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-67-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-68-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-69-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-70-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-71-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-75-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-82-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-84-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect behavioral2/memory/1616-85-0x0000000000400000-0x0000000001858000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1616 7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe 1616 7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe 1616 7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe 1616 7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1616 7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe 1616 7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe 1616 7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe"C:\Users\Admin\AppData\Local\Temp\7da5a48c377e6efc5bc03b4f85555603cf7fa563c3423172f01e2d187029088b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4164 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:1964