Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2022, 04:12
Behavioral task
behavioral1
Sample
b34731268a1fc767f5cdc87049d11f5e4b79a3b079d10f3590a980b191bbb2d9.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b34731268a1fc767f5cdc87049d11f5e4b79a3b079d10f3590a980b191bbb2d9.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
b34731268a1fc767f5cdc87049d11f5e4b79a3b079d10f3590a980b191bbb2d9.exe
-
Size
1.1MB
-
MD5
12c49a7efe706d6a67c6a9dd06343386
-
SHA1
f68ef4255a5e958942aee4c9f3bfbf77e83c2eb1
-
SHA256
b34731268a1fc767f5cdc87049d11f5e4b79a3b079d10f3590a980b191bbb2d9
-
SHA512
e8c87324f508effbe8b9744f5cd2d770a6427e28089554dcee615395fc6606d54b038e4b2a4a8020829dea82d3b192d65f3f45415874c07629256abbd97549e5
-
SSDEEP
1536:v4XP0IXa/21KEKa6dCmu7PcnotkAEpBiyQ0wsYn3:vQ0IXa/2FFPcnotkAEpBiyQ0wsY3
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5048-132-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/5048-135-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5048 b34731268a1fc767f5cdc87049d11f5e4b79a3b079d10f3590a980b191bbb2d9.exe