Analysis
-
max time kernel
7s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-01-2021 18:30
Static task
static1
Behavioral task
behavioral1
Sample
ElectraSoft_FaxMail_Network_keygen_by_aaocg.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ElectraSoft_FaxMail_Network_keygen_by_aaocg.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
ElectraSoft_FaxMail_Network_keygen_by_aaocg.exe
-
Size
8.4MB
-
MD5
7783fb57f7fe810c9dcfbbfda2b47eb6
-
SHA1
2892bfd93cf7ef01e928960ecd5cc082bca99f3e
-
SHA256
6d5307f8ae9c15be09190b6ff1f2c557d7a0519b765b6ef020ac3e7343fb190c
-
SHA512
171a6b1651cd062869a5b979616e54a57b83e14af969d19a8aa344c2d5ed123a5d00ec8a51c2713146b9bfd2ec37c4c335cc0240cb0890b60b768e50cfc7478a
Score
1/10
Malware Config
Signatures
-
Processes:
ElectraSoft_FaxMail_Network_keygen_by_aaocg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main ElectraSoft_FaxMail_Network_keygen_by_aaocg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ElectraSoft_FaxMail_Network_keygen_by_aaocg.exepid process 296 ElectraSoft_FaxMail_Network_keygen_by_aaocg.exe 296 ElectraSoft_FaxMail_Network_keygen_by_aaocg.exe