Overview
overview
10Static
static
10ida.exe
windows7-x64
1ida.exe
windows10-2004-x64
1ida64.exe
windows7-x64
1ida64.exe
windows10-2004-x64
1idapyswitch.exe
windows7-x64
1idapyswitch.exe
windows10-2004-x64
1idat.exe
windows7-x64
1idat.exe
windows10-2004-x64
1idat64.exe
windows7-x64
1idat64.exe
windows10-2004-x64
1qwingraph.exe
windows7-x64
1qwingraph.exe
windows10-2004-x64
1Analysis
-
max time kernel
17s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 13:11
Behavioral task
behavioral1
Sample
ida.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ida.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
ida64.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ida64.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
idapyswitch.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
idapyswitch.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
idat.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
idat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
idat64.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
idat64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
qwingraph.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
qwingraph.exe
Resource
win10v2004-20240709-en
General
-
Target
ida64.exe
-
Size
4.0MB
-
MD5
24ba0b4e0a3445a6c2fb866d94669f05
-
SHA1
3b6bf89f5ec4b19266260fd488ae720a90f1865d
-
SHA256
70840575ebddb25412f6de60329d5d395b325b709df9202411b723d0744c9624
-
SHA512
dcbd7babaa0de562a0a6682c3c0b053c419ddc2e78d6a0213c081a5ca50a256a720d0c6cbf3b2de669a5410918dfeb2d7d4fc29b23ae3285103c8e3c2be8b2b0
-
SSDEEP
49152:GQptxtn8v9flRURQXyczsoBR9RAzkdk9ltnv2UtxOpYjObpJWYcmD75zoELxnXAm:GitxMR4QuoBPRAzz9lRvMVtdwdZro6m
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
ida64.exepid process 2448 ida64.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ida64.exepid process 2448 ida64.exe