Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 14:44
Behavioral task
behavioral1
Sample
b20ab7745656d825517cf54611fbe0fcbd6706890b2a1919e268e49cae7ec7a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b20ab7745656d825517cf54611fbe0fcbd6706890b2a1919e268e49cae7ec7a7.exe
Resource
win10v2004-20220812-en
General
-
Target
b20ab7745656d825517cf54611fbe0fcbd6706890b2a1919e268e49cae7ec7a7.exe
-
Size
655KB
-
MD5
6fc29e50d3137cc0ec59a046c191502c
-
SHA1
ee02e11a8086999e684d36a08ea093893181487b
-
SHA256
b20ab7745656d825517cf54611fbe0fcbd6706890b2a1919e268e49cae7ec7a7
-
SHA512
54ed51e82af443e717230780bb5d3cfda7a76a22827ba027a7b0f29791a2840e7e596f53cf5b3b527c5d1b23c56b3dbdbd85b480b21c9e07070f23c4e75380ad
-
SSDEEP
12288:3Ix6BbwphOmP7NCOrzREXInJpYFsFtb17JoJ0HvWG01o/Z8KHaeYYe92UYW+14fR:fBbcO0NCE2QYFURi0Hv501odHx2HKWX
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1760-55-0x0000000000400000-0x0000000000663000-memory.dmp upx behavioral1/memory/1760-56-0x0000000000400000-0x0000000000663000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1760 b20ab7745656d825517cf54611fbe0fcbd6706890b2a1919e268e49cae7ec7a7.exe 1760 b20ab7745656d825517cf54611fbe0fcbd6706890b2a1919e268e49cae7ec7a7.exe 1760 b20ab7745656d825517cf54611fbe0fcbd6706890b2a1919e268e49cae7ec7a7.exe