Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26/06/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
9da31b0df923d6488a560feeb351dc946824410475dc727cec195644e1b9f856.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9da31b0df923d6488a560feeb351dc946824410475dc727cec195644e1b9f856.exe
Resource
win10v2004-20240611-en
General
-
Target
9da31b0df923d6488a560feeb351dc946824410475dc727cec195644e1b9f856.exe
-
Size
7.6MB
-
MD5
14d2aa3db66cadc5d9c3f63be82a2d2f
-
SHA1
d73ed2d375c099cf411518482c4dcda4f769d19a
-
SHA256
9da31b0df923d6488a560feeb351dc946824410475dc727cec195644e1b9f856
-
SHA512
791027b2933e269ff950912283bce81ec2f53412f5d9058864192e52848ef78ec6dae6a2468313d8b886f5c52e3a8c2b280c6a8408be18b1748229777b1b6518
-
SSDEEP
196608:QTvvGP4yZU6aDDUHIdQyMdmuCLZjXATznd+/diU:QLvqZyDUHIHUjC9jXC+iU
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule behavioral2/memory/1684-2-0x0000000000400000-0x0000000000A86000-memory.dmp UPX -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1684 9da31b0df923d6488a560feeb351dc946824410475dc727cec195644e1b9f856.exe 1684 9da31b0df923d6488a560feeb351dc946824410475dc727cec195644e1b9f856.exe 1684 9da31b0df923d6488a560feeb351dc946824410475dc727cec195644e1b9f856.exe 1684 9da31b0df923d6488a560feeb351dc946824410475dc727cec195644e1b9f856.exe