Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
e5569c753a34c66f375944f70718366554f1cd6693d08486f82ac7fce6f625a3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e5569c753a34c66f375944f70718366554f1cd6693d08486f82ac7fce6f625a3.exe
Resource
win10v2004-20240709-en
General
-
Target
e5569c753a34c66f375944f70718366554f1cd6693d08486f82ac7fce6f625a3.exe
-
Size
4.9MB
-
MD5
73f2b83514240b2b4fe1e0d095d50144
-
SHA1
b0c04f0a641808be43d61264d8852b107dbc80fc
-
SHA256
e5569c753a34c66f375944f70718366554f1cd6693d08486f82ac7fce6f625a3
-
SHA512
1de8566033d61cbcab4df645cbd192d7abfcd942adf352d66ef3be9fdd9dca6ce1238bf8d04cd2d690b0ad8a5453616a6f2b86e8a1f9c577338fb9d946465c53
-
SSDEEP
49152:rzTCakd5xKHlTKY3n/oV7vZaAeTm3HmNOwUlLC+s8KuqGaX0ToIBAUZLY4QKMfAb:/7t3n/o1xaqGAJBAUZLQKUoICtjCRM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/924-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/924-8-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 924 e5569c753a34c66f375944f70718366554f1cd6693d08486f82ac7fce6f625a3.exe 924 e5569c753a34c66f375944f70718366554f1cd6693d08486f82ac7fce6f625a3.exe 924 e5569c753a34c66f375944f70718366554f1cd6693d08486f82ac7fce6f625a3.exe