Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
d0e816b6ffd263b34c6bb43da0781780b6fa8332e02fa7f6cb7e54a8425a9882.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d0e816b6ffd263b34c6bb43da0781780b6fa8332e02fa7f6cb7e54a8425a9882.exe
Resource
win10v2004-20240709-en
General
-
Target
d0e816b6ffd263b34c6bb43da0781780b6fa8332e02fa7f6cb7e54a8425a9882.exe
-
Size
999KB
-
MD5
1c5775d6722873256b04603e30adcd9b
-
SHA1
ddb5ec20595d2ff89c434405653ee2125633df72
-
SHA256
d0e816b6ffd263b34c6bb43da0781780b6fa8332e02fa7f6cb7e54a8425a9882
-
SHA512
3cca52066ade73e259c7af3874a09c3ac2dbbb2f75a2a37aa1063679edbf187677241770dae6cd05dec6ffc009aabb528f76866e6cbb85c5d6293fa0c062b70b
-
SSDEEP
24576:chIjd7wrbDDSJqkqLi64r/f7oK7Lu3vwS4Jdpp2sVfh:chIjWfD2oL96fMKq3IlN2s7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/368-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/368-49-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 368 d0e816b6ffd263b34c6bb43da0781780b6fa8332e02fa7f6cb7e54a8425a9882.exe 368 d0e816b6ffd263b34c6bb43da0781780b6fa8332e02fa7f6cb7e54a8425a9882.exe 368 d0e816b6ffd263b34c6bb43da0781780b6fa8332e02fa7f6cb7e54a8425a9882.exe