Analysis
-
max time kernel
97s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 02:29
Behavioral task
behavioral1
Sample
ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b.exe
Resource
win10v2004-20220901-en
General
-
Target
ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b.exe
-
Size
358KB
-
MD5
579578d8cac6a46cee97a25a3bd564e4
-
SHA1
3bf47f144f1308a8e2cabb27bc35a572539eab42
-
SHA256
ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b
-
SHA512
48bb09157a108b142f39cc9650ff00bc38aeb3c7e6d86b9abaf4b3f6fc93ede2b3cfddcf68425cee6e85304308792ce807f34489ec0bbd1f25244f87b2a26a51
-
SSDEEP
6144:tn6hMmDhDYcD0DL/4kS1KvqRa1AZy2C1otNO1LfLROyBKH5bOg3IgkVSTlkKoS:tn2yc+MT1oC+PhsqBKZf3I9ghoS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1612-132-0x0000000000400000-0x00000000008D1000-memory.dmp upx behavioral2/memory/1612-135-0x0000000000400000-0x00000000008D1000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1612 ab5c1dc3d6c3817e858f651999eed5d2dc57bd09e9f2a6ae114ddecf10ad6c6b.exe