Analysis
-
max time kernel
94s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:41
Behavioral task
behavioral1
Sample
c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271.exe
Resource
win10v2004-20220901-en
General
-
Target
c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271.exe
-
Size
548KB
-
MD5
50917e8197efacaa513136cc09cc1490
-
SHA1
2559ae9b64e7306f0500c05ea825cf09096041f9
-
SHA256
c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271
-
SHA512
d9539e9bb249286c56afa06478f61f1b9f2ce2b71246c82ded65bb236c7b9f7f4b02c8f75b90422ad727f90ee629752a0fd495de1ff28cf81e22ee6bfcde48f1
-
SSDEEP
12288:1jc1c8xZkax7cymkO4QiavOkYTrCq2fCfxS0c0dcjy5I:1jcW8vkaxlkh8gfCfs0cmqyI
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1664-55-0x0000000000400000-0x0000000000566000-memory.dmp upx behavioral1/memory/1664-56-0x0000000000400000-0x0000000000566000-memory.dmp upx -
Processes:
c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271.exepid process 1664 c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271.exe 1664 c0fd0d0c94f0720ca9d61e4b680139ea1c54bfd01cd95f25929598e737669271.exe