Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 12:00
Behavioral task
behavioral1
Sample
6a061573050114e620b5ac7edfb8798fbaa21af61fcfd8014eade5ddc4b4c827.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6a061573050114e620b5ac7edfb8798fbaa21af61fcfd8014eade5ddc4b4c827.exe
Resource
win10v2004-20220901-en
General
-
Target
6a061573050114e620b5ac7edfb8798fbaa21af61fcfd8014eade5ddc4b4c827.exe
-
Size
168KB
-
MD5
624a68d46cb2eb9a8643206e5267c1ab
-
SHA1
0dec7d7b80dff4f370dbff1d59e5839e7e8b9d8b
-
SHA256
6a061573050114e620b5ac7edfb8798fbaa21af61fcfd8014eade5ddc4b4c827
-
SHA512
4ae784c22552549eb440e7bbfdb1e6614355456d936e1fc0a5189eeccad71aabb9d5262257a3a98cb1292f7299c86f8c71c474fd5610d660e97d03d0d0998edd
-
SSDEEP
3072:owwcwLBQQIIEyFmc8BZniEC+kL62L+1KWqt7tR5OTNL5TE1ZDUI/GWRo2rXfZ6:Lj44IEyFBInpCV62ayxr5ORdTE1dUI+l
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1436-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1436-56-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1436 6a061573050114e620b5ac7edfb8798fbaa21af61fcfd8014eade5ddc4b4c827.exe 1436 6a061573050114e620b5ac7edfb8798fbaa21af61fcfd8014eade5ddc4b4c827.exe