Analysis
-
max time kernel
61s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 01:21
Behavioral task
behavioral1
Sample
4cb9e2be27d058402ea9b711c54db55e8b28e16d956322ef7ad533e2967e0c6c.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4cb9e2be27d058402ea9b711c54db55e8b28e16d956322ef7ad533e2967e0c6c.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4cb9e2be27d058402ea9b711c54db55e8b28e16d956322ef7ad533e2967e0c6c.exe
-
Size
485KB
-
MD5
6548806c651d91250ca37fd70a16c740
-
SHA1
546c036bf1a7340f86a73b4e9d430161a02528d3
-
SHA256
4cb9e2be27d058402ea9b711c54db55e8b28e16d956322ef7ad533e2967e0c6c
-
SHA512
df825fc35457ded10b2e1dc54b2b290bd4366b057bc3414c35660a025dd59b375f8d2b0926c0cb985c3542ee13f30b05a8fef689cc2f43edc1201b2c782d5e8c
-
SSDEEP
12288:Pjsh+eX0RXIKKok1uRnERzprBCd6zRjmik3aYxkdRx1g:PjsjXGY9o3wz7CUYik3aYadRjg
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1884-132-0x0000000000400000-0x0000000000556000-memory.dmp upx behavioral2/memory/1884-133-0x0000000000400000-0x0000000000556000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1884 4cb9e2be27d058402ea9b711c54db55e8b28e16d956322ef7ad533e2967e0c6c.exe 1884 4cb9e2be27d058402ea9b711c54db55e8b28e16d956322ef7ad533e2967e0c6c.exe