Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 17:13
Behavioral task
behavioral1
Sample
3c6d4b946e9322092ef927f49fb617b147df57ff03976acdae499076034352b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c6d4b946e9322092ef927f49fb617b147df57ff03976acdae499076034352b2.exe
Resource
win10v2004-20220812-en
General
-
Target
3c6d4b946e9322092ef927f49fb617b147df57ff03976acdae499076034352b2.exe
-
Size
171KB
-
MD5
82adf82bb5847a85188795f7673fa7a5
-
SHA1
0c440815add4252835fb31c008852acf2f6b4655
-
SHA256
3c6d4b946e9322092ef927f49fb617b147df57ff03976acdae499076034352b2
-
SHA512
740d473295ea18c017b74e741640adf55e70fd0d0156606038019e776122ede842601e82ecc0144ea328e48045f9cda4815cd71a40abc4dc5e071bd6f3dd43d1
-
SSDEEP
3072:NwwcwLBQQIIEyFmc8BZniEC+kL62L+1KWqt7tR5OTNL5TE1ZDUI/GWRo2rXfZf:Sj44IEyFBInpCV62ayxr5ORdTE1dUI+0
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1112-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1112-56-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1112 3c6d4b946e9322092ef927f49fb617b147df57ff03976acdae499076034352b2.exe 1112 3c6d4b946e9322092ef927f49fb617b147df57ff03976acdae499076034352b2.exe