Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 23:49
Behavioral task
behavioral1
Sample
6425df79441cb0b9d744bae0b02d6bf32b02f568df504ed303a49cc58f0ef93b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6425df79441cb0b9d744bae0b02d6bf32b02f568df504ed303a49cc58f0ef93b.exe
Resource
win10v2004-20220812-en
General
-
Target
6425df79441cb0b9d744bae0b02d6bf32b02f568df504ed303a49cc58f0ef93b.exe
-
Size
77KB
-
MD5
06869cd2896860b59e8715fa18c595ab
-
SHA1
f9823466a3efd9d45beb5087e780e1eb06561b78
-
SHA256
6425df79441cb0b9d744bae0b02d6bf32b02f568df504ed303a49cc58f0ef93b
-
SHA512
8c0a3f35067ffd72d22ac5c467cbd635ff2eafcee8c7af1d39eb207e6602449bb74897bb086afe652e657c8506a027206223e639df51430de63e7191007f60e5
-
SSDEEP
768:r2/FPref/kQVPAmH/ajWrTwFmlYtwCB/BfBTXZqZC2pQmF8e6yPiehuWW8Z1jQxL:a/F0/k0tH//+mLZ+xnTeyM5zU7QIyC
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3808-132-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/3808-135-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/3808-136-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3808 6425df79441cb0b9d744bae0b02d6bf32b02f568df504ed303a49cc58f0ef93b.exe 3808 6425df79441cb0b9d744bae0b02d6bf32b02f568df504ed303a49cc58f0ef93b.exe 3808 6425df79441cb0b9d744bae0b02d6bf32b02f568df504ed303a49cc58f0ef93b.exe