Overview
overview
10Static
static
10ida.exe
windows7-x64
1ida.exe
windows10-2004-x64
1ida64.exe
windows7-x64
1ida64.exe
windows10-2004-x64
1idapyswitch.exe
windows7-x64
1idapyswitch.exe
windows10-2004-x64
1idat.exe
windows7-x64
1idat.exe
windows10-2004-x64
1idat64.exe
windows7-x64
1idat64.exe
windows10-2004-x64
1qwingraph.exe
windows7-x64
1qwingraph.exe
windows10-2004-x64
1Analysis
-
max time kernel
129s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 13:11
Behavioral task
behavioral1
Sample
ida.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ida.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
ida64.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ida64.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
idapyswitch.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
idapyswitch.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
idat.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
idat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
idat64.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
idat64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
qwingraph.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
qwingraph.exe
Resource
win10v2004-20240709-en
General
-
Target
ida64.exe
-
Size
4.0MB
-
MD5
24ba0b4e0a3445a6c2fb866d94669f05
-
SHA1
3b6bf89f5ec4b19266260fd488ae720a90f1865d
-
SHA256
70840575ebddb25412f6de60329d5d395b325b709df9202411b723d0744c9624
-
SHA512
dcbd7babaa0de562a0a6682c3c0b053c419ddc2e78d6a0213c081a5ca50a256a720d0c6cbf3b2de669a5410918dfeb2d7d4fc29b23ae3285103c8e3c2be8b2b0
-
SSDEEP
49152:GQptxtn8v9flRURQXyczsoBR9RAzkdk9ltnv2UtxOpYjObpJWYcmD75zoELxnXAm:GitxMR4QuoBPRAzz9lRvMVtdwdZro6m
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
ida64.exepid process 1320 ida64.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 4736 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4736 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ida64.exepid process 1320 ida64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ida64.exe"C:\Users\Admin\AppData\Local\Temp\ida64.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1320
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x40c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4736