Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 10:30
Behavioral task
behavioral1
Sample
dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe
-
Size
11.8MB
-
MD5
6c25d05253ed9de6c3530115d4fbb2ec
-
SHA1
8081b930cbff8e3491eaab3fed378a3b9ea39c57
-
SHA256
dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125
-
SHA512
26e321639f3e287d6a682ed4f46a8d277e6b1c8d135f4024c31c5d3cef52188214a4609c167ad661fdf3c56b311df5ea4c6be02c5b9967e01361605714377889
-
SSDEEP
196608:DVajRq5W6KF46Mb9iWVag9cGKbzEdf9ITdH5eTmrovcCRR8gIjVpEfB5e9duMhTn:wRqwrF46Mb4caAbKbu9ITdEU4zGq5Edz
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1872-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-52-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral1/memory/1872-39-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-35-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-83-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-84-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-85-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-86-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-87-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-88-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-89-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-90-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect behavioral1/memory/1872-91-0x0000000000400000-0x0000000001E96000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1872 dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe 1872 dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1872 dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe 1872 dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe 1872 dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe"C:\Users\Admin\AppData\Local\Temp\dbcb1dfc861a88f92e6611cf23995bf385b05d29210fecfe846dd6df7ac3d125.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1872