Analysis
-
max time kernel
51s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 08:39
Behavioral task
behavioral1
Sample
21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe
-
Size
11.7MB
-
MD5
3ee7e1782574569f7a3b8d5c45209778
-
SHA1
b6daabd2b8d3560fb70313a9246d96968b4eea96
-
SHA256
21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81
-
SHA512
b785d8c175e937dbe7f0abf6cf3523669cd8807493c628c9870e89ab68faf175d069e05c6ee65c620d1bae2f1bba3047c7bc0e4692a440444f1bb250245d7385
-
SSDEEP
196608:T+PXoma2xLDGSA/nrbI+lu0bL7nc9VzxDTmPn0vBKaO7eJA8DV9TBhmsx2lLYNJ3:uXja0L6nPI+lPK9WXaD9TBhZyLUf7vh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4544-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4544-12-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/4544-7-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-54-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-55-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-56-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-57-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-58-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-59-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-60-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-61-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-62-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-63-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-64-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-65-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-66-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-67-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-68-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-69-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-70-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-71-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-72-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-73-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-74-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-75-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-76-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect behavioral2/memory/4544-77-0x0000000000400000-0x0000000001F53000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4544 21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe 4544 21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe 4544 21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe 4544 21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4544 21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe 4544 21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe 4544 21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe"C:\Users\Admin\AppData\Local\Temp\21e35c1155bd34a476ba9bc31b42945f79d53e2d942cf54f699dd8d6d6bd0b81.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4544