Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
240c3af35c73e29a71502751470970f39ecf18c951ded62531fabc8d9da97620.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
240c3af35c73e29a71502751470970f39ecf18c951ded62531fabc8d9da97620.exe
Resource
win10v2004-20220812-en
General
-
Target
240c3af35c73e29a71502751470970f39ecf18c951ded62531fabc8d9da97620.exe
-
Size
1.3MB
-
MD5
e768c21a76c0db963091e5cfe6852390
-
SHA1
8ea0250ed4edd3000718635ddd93879b8085b680
-
SHA256
240c3af35c73e29a71502751470970f39ecf18c951ded62531fabc8d9da97620
-
SHA512
c5dc6bd0becb5b2d81bbf549a2d45d4a33e0965af7dafff772a727941fc9b4e025d0a26574179188524ec6ebae7e27f5ca59800ec67bcd9e2cd3e1390d76ec77
-
SSDEEP
12288:f2u//jEbhYB7ARVkb2DEpsqCuHyugR5nWFpPoS6Im4f3jfjPITeWPX:f24YbE7iaGisqXHyujboaLjPITeA
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1660-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1660-98-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1660 240c3af35c73e29a71502751470970f39ecf18c951ded62531fabc8d9da97620.exe 1660 240c3af35c73e29a71502751470970f39ecf18c951ded62531fabc8d9da97620.exe 1660 240c3af35c73e29a71502751470970f39ecf18c951ded62531fabc8d9da97620.exe