Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc.exe
-
Size
1.7MB
-
MD5
2d759e0f2e28c4e029b7fbc4a6d73d41
-
SHA1
803c133bcb41e867e6d3e428955ab17dbfe178eb
-
SHA256
6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc
-
SHA512
59de31c959440fa5a82d506459a472d53879909f6dff0b0a1e9abfb5fee3017678a3cfb64d9fe6e43dcbb6289079ae82f5f0581fc4fef8957c367add3959ca96
-
SSDEEP
24576:I/DYjhYLnGEhtH9mDIK3UKC/oG2BKZMqN:I/UCLn7HyC/oG2I9
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4224-132-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-133-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-134-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-136-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-138-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-140-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-146-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-144-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-148-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-142-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-150-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-152-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-160-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-166-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-164-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-162-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-158-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-156-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-154-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-168-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-170-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-172-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-174-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4224-175-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4224 6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc.exe 4224 6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc.exe 4224 6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc.exe 4224 6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc.exe 4224 6160df4119fc7e1e19e2d05c4060c962ae79aefecdd4cab746788853e06128dc.exe