Analysis
-
max time kernel
44s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 07:09
Behavioral task
behavioral1
Sample
dbd93f17a563849b9a2f0b3c1e2beddf3ed4d785d7d89c41e8c29ac7f1f17d1f.exe
Resource
win7-20220901-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dbd93f17a563849b9a2f0b3c1e2beddf3ed4d785d7d89c41e8c29ac7f1f17d1f.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
dbd93f17a563849b9a2f0b3c1e2beddf3ed4d785d7d89c41e8c29ac7f1f17d1f.exe
-
Size
538KB
-
MD5
817dcc9c6cc87caf37a124c811d858c0
-
SHA1
fdcecbbe84a53fb5cd527b3a76dab50c2684ec21
-
SHA256
dbd93f17a563849b9a2f0b3c1e2beddf3ed4d785d7d89c41e8c29ac7f1f17d1f
-
SHA512
0a29ba1ec9be40197a00e9533c4b39dd866aece8bc534f0c8fa25b765f030ae8cf06a9e5f10e95eb5983e729d34e3f36c6b07c3e97adf75adb4a0794d3a84527
-
SSDEEP
12288:mj45WvSJQ3lS0e8qkaIEvin/8D96MKDQgHFFVA+:mj455i8NknEDAMKDQWFVA+
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1280-55-0x0000000000400000-0x000000000055E000-memory.dmp upx behavioral1/memory/1280-57-0x0000000000400000-0x000000000055E000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main dbd93f17a563849b9a2f0b3c1e2beddf3ed4d785d7d89c41e8c29ac7f1f17d1f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1280 dbd93f17a563849b9a2f0b3c1e2beddf3ed4d785d7d89c41e8c29ac7f1f17d1f.exe 1280 dbd93f17a563849b9a2f0b3c1e2beddf3ed4d785d7d89c41e8c29ac7f1f17d1f.exe