Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-10-2022 21:20
Static task
static1
Behavioral task
behavioral1
Sample
5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe
Resource
win10v2004-20220901-en
General
-
Target
5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe
-
Size
1.3MB
-
MD5
7499bcb7cef235acc3570a4172e75631
-
SHA1
5ab3eaf69d66acdfdb5b40df41788059417b59a2
-
SHA256
5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934
-
SHA512
56e4a771756ee0b5b97da0de0fd814959247b63036b36c6ef399c3944954f3566dfd90793d5ad05a58143e85226c199e03bd9c9f8fa85e04bbcb247917ff746b
-
SSDEEP
24576:grZWgqYWDIoN/3qJuwc/lzZLVdgaHB+wWqwRAP3yglzCyU0O6Pb64SRN:gcnHvwRMLzPPO6PmB
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1972-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1972-101-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1972 5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe 1972 5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe 1972 5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe 1972 5d7d04426bb6ae1263fb64bb08a53de3f27f536bcc6528bbc7026df4b07fb934.exe