Analysis
-
max time kernel
90s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
342fb22f1290ae38c30fa2ea45ef3ac7deff60f131ce2971b92b500015b9c561.exe
Resource
win7-20221111-en
General
-
Target
342fb22f1290ae38c30fa2ea45ef3ac7deff60f131ce2971b92b500015b9c561.exe
-
Size
213KB
-
MD5
4f943b05d5420ea1e195a0c98e506120
-
SHA1
c3f555a8b25b43259e88d3f58d914a5bc09c43f4
-
SHA256
342fb22f1290ae38c30fa2ea45ef3ac7deff60f131ce2971b92b500015b9c561
-
SHA512
b9a32488863154a0b71699ff48b64ea4bf1ba96601551320ab1af1ea1181b8601233c1ce6d54edba6fb257e43e6ef530ae1d7f930be69be1ea993f4fb2974b62
-
SSDEEP
3072:TTsCnE5rChD67HuzkZ3Qi/TBfULmLlJnFlGSkrqcSBJhIQQn/Iy:ECnE9ChWTykxQi/TB4mjbLBnBI9nR
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
resource yara_rule behavioral2/memory/3284-133-0x0000000002470000-0x00000000034FE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3284 342fb22f1290ae38c30fa2ea45ef3ac7deff60f131ce2971b92b500015b9c561.exe