Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2022, 21:41
Behavioral task
behavioral1
Sample
541f01d01670b3bbf98803952c66042350e7de5876463c0d389fabb5a471e489.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
541f01d01670b3bbf98803952c66042350e7de5876463c0d389fabb5a471e489.exe
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
541f01d01670b3bbf98803952c66042350e7de5876463c0d389fabb5a471e489.exe
-
Size
422KB
-
MD5
2afa668f1f36b4d98f4f1fff72348582
-
SHA1
6e7a69d0e704eab7235b4b53e682c4086052b704
-
SHA256
541f01d01670b3bbf98803952c66042350e7de5876463c0d389fabb5a471e489
-
SHA512
115ac339c003774666551e4a66d358231a89279bb0096190a9a8bfd64611ee351a952587b54399536bdf774fcb41b25529c5ac28cde7c9a696aa09a235500029
-
SSDEEP
12288:jjqHIgLoS4CH3jNwW4+qRiHqI1+bLlMVONF18tLtCkFSWoS+:aFhNX4divYMVOL18tYkFSf
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2200-132-0x0000000000400000-0x0000000000556000-memory.dmp upx behavioral2/memory/2200-133-0x0000000000400000-0x0000000000556000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2200 541f01d01670b3bbf98803952c66042350e7de5876463c0d389fabb5a471e489.exe 2200 541f01d01670b3bbf98803952c66042350e7de5876463c0d389fabb5a471e489.exe