Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 17:58
Behavioral task
behavioral1
Sample
733774196666c5cc54f5bd7ac2493f95b331b33045b9c7cdc6244a1619568e15.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
733774196666c5cc54f5bd7ac2493f95b331b33045b9c7cdc6244a1619568e15.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
733774196666c5cc54f5bd7ac2493f95b331b33045b9c7cdc6244a1619568e15.exe
-
Size
56KB
-
MD5
0cfc013551745de05b3fdd79e28ef3e3
-
SHA1
67bad9ddedd331fbfbe14c02a822df3fccd4ef4a
-
SHA256
733774196666c5cc54f5bd7ac2493f95b331b33045b9c7cdc6244a1619568e15
-
SHA512
94d6a9a27c8c50b43ffd6707784b80f93572c0c6a084752aaec629149bf1f1449f52569e2e0e0e207f78b21f026ab7922ee8839188df296e25e0ab3c68d49ba9
-
SSDEEP
1536:DXTT2UPYs4BtVezzv+gLi3JltNfVeZkmkEnw:DXrPYssuvni3JN9eqIw
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1788-56-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1788-57-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1788 733774196666c5cc54f5bd7ac2493f95b331b33045b9c7cdc6244a1619568e15.exe