Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 20:02
Behavioral task
behavioral1
Sample
9c036619fa5a50edcdec68c791bfe739a9f7b62fea14d389312b3f26398e02de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c036619fa5a50edcdec68c791bfe739a9f7b62fea14d389312b3f26398e02de.exe
Resource
win10v2004-20220812-en
General
-
Target
9c036619fa5a50edcdec68c791bfe739a9f7b62fea14d389312b3f26398e02de.exe
-
Size
709KB
-
MD5
bf64360a9bd6be8c705b154f927ff4ce
-
SHA1
230047f9d197725c82f8c5350b620685173cae64
-
SHA256
9c036619fa5a50edcdec68c791bfe739a9f7b62fea14d389312b3f26398e02de
-
SHA512
535f241887ef36b9387414868082e1f621caba3059736142021fea9e9d8919d79c8cf9f8eaacb123558f6490de100f232cd67b61d4f6d648e32ce9142d3fb536
-
SSDEEP
12288:zGg7iFtmECjfAW+flQfl15q5+XkxJpDYBj8lfs5PJqO46DN4osmXJMmpqIB:zGg7iYECjfA1tQf0AuXYBcs5JqOtCnm5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4964-132-0x0000000000400000-0x0000000000596000-memory.dmp upx behavioral2/memory/4964-133-0x0000000000400000-0x0000000000596000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4964 9c036619fa5a50edcdec68c791bfe739a9f7b62fea14d389312b3f26398e02de.exe 4964 9c036619fa5a50edcdec68c791bfe739a9f7b62fea14d389312b3f26398e02de.exe