Analysis
-
max time kernel
130s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 05:08
Behavioral task
behavioral1
Sample
a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe
Resource
win7-20240611-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe
Resource
win10v2004-20240611-en
3 signatures
150 seconds
General
-
Target
a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe
-
Size
2.0MB
-
MD5
ac8373bc1b6adaa3cd815df506be8e65
-
SHA1
6d139cc09ef3da761ffddb27691b5c2cde6fe3b8
-
SHA256
a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6
-
SHA512
7e0b6a5107c2f185782d48c07f1b6b5ffe40d5cdd5af04b7be93026cdfa7bace282475d177105f9be8ec4a50907df22a288e5292a291bd51aa3d22812a21574d
-
SSDEEP
49152:Hx36PbyVFZysOazkycLy8LiEQnQcJz+yD3KX:Hx36DyPZyPaQty8mEQHJzfKX
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1676-0-0x0000000000400000-0x000000000082D000-memory.dmp upx behavioral2/memory/1676-1-0x0000000000400000-0x000000000082D000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1676 a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe 1676 a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1676 a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe 1676 a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe"C:\Users\Admin\AppData\Local\Temp\a884027f640c61d086a6613e3ff0d7081002cfe477b78716a0d5c4343788bfb6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1676