Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 02:54
Behavioral task
behavioral1
Sample
15066992193ef3dbfea0ea07c8bbc2bf495f1d40c10232789926b642bc2c8b80.exe
Resource
win7-20220901-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
15066992193ef3dbfea0ea07c8bbc2bf495f1d40c10232789926b642bc2c8b80.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
15066992193ef3dbfea0ea07c8bbc2bf495f1d40c10232789926b642bc2c8b80.exe
-
Size
82KB
-
MD5
6b6171789fb325f055e1022cdb4b6be3
-
SHA1
13ad9ea9c8676256f652d095974200dc3295dcc8
-
SHA256
15066992193ef3dbfea0ea07c8bbc2bf495f1d40c10232789926b642bc2c8b80
-
SHA512
e21d2337ad671421e682b90a702d43f874202dd243caf7d0d01bf79df35a55cd61c9abe6b13bb080d20e7ec50d9cf47b4f2d7b0fe31b8f18981d0a540cf2f625
-
SSDEEP
768:X8rbQCtgEGLoY7pUx1UMLQ+0Vm0jdRfIWcu:HQgouw1F4TfR
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1228-56-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/1228-57-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1228 15066992193ef3dbfea0ea07c8bbc2bf495f1d40c10232789926b642bc2c8b80.exe