Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 12:49
Behavioral task
behavioral1
Sample
3e65986fff07dd68a78de71c47430c720972e874e592ca3688796631f9cd098b.exe
Resource
win7-20240419-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e65986fff07dd68a78de71c47430c720972e874e592ca3688796631f9cd098b.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3e65986fff07dd68a78de71c47430c720972e874e592ca3688796631f9cd098b.exe
-
Size
5.8MB
-
MD5
7c5898afcf0823fd787ec12887546081
-
SHA1
a2f037916b8141ea48d6a6843f4cb053c4d695d6
-
SHA256
3e65986fff07dd68a78de71c47430c720972e874e592ca3688796631f9cd098b
-
SHA512
725eb1303893271f96888147874b121487da5c84855f79ca591e0ce064b8b4a7896624f409b64951dc949ee39d7c585a6dc419bc0530f7d470b63b722cb89244
-
SSDEEP
98304:9aQ3dZW9gVMiZgVmK7doCjP42H42TdngFjvrAJhssIsHFU+fwjSNEd:9aQ3dggVYVmK7doCc2HvdYjkJhLju+1k
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4576-0-0x0000000000400000-0x0000000000B23000-memory.dmp upx behavioral2/memory/4576-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4576-49-0x0000000000400000-0x0000000000B23000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4576 3e65986fff07dd68a78de71c47430c720972e874e592ca3688796631f9cd098b.exe 4576 3e65986fff07dd68a78de71c47430c720972e874e592ca3688796631f9cd098b.exe 4576 3e65986fff07dd68a78de71c47430c720972e874e592ca3688796631f9cd098b.exe