Analysis
-
max time kernel
149s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:54
Behavioral task
behavioral1
Sample
63b48f5b350fd58da278513d8e7b89379c965eeb765671a55acc8415bbcc50c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63b48f5b350fd58da278513d8e7b89379c965eeb765671a55acc8415bbcc50c6.exe
Resource
win10v2004-20220812-en
General
-
Target
63b48f5b350fd58da278513d8e7b89379c965eeb765671a55acc8415bbcc50c6.exe
-
Size
548KB
-
MD5
4536b9ffbc4752f288b7d7318b391a90
-
SHA1
368ba7fe5faf5070cb18fafa456b906e12846038
-
SHA256
63b48f5b350fd58da278513d8e7b89379c965eeb765671a55acc8415bbcc50c6
-
SHA512
ac434d5d8c394361fe411a455df3cf33b6ef326cbd647db141b981b9f65678c785e04dd458d5e9cee92387bb69e56fdbe1fdbe9ab0cec4885eb694f8efe052b8
-
SSDEEP
12288:1jc1c8xZkax7cymkO4QiavOkYTrCq2fCfxS0c0dcjy5L:1jcW8vkaxlkh8gfCfs0cmqyL
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2412-132-0x0000000000400000-0x0000000000566000-memory.dmp upx behavioral2/memory/2412-133-0x0000000000400000-0x0000000000566000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
63b48f5b350fd58da278513d8e7b89379c965eeb765671a55acc8415bbcc50c6.exepid process 2412 63b48f5b350fd58da278513d8e7b89379c965eeb765671a55acc8415bbcc50c6.exe 2412 63b48f5b350fd58da278513d8e7b89379c965eeb765671a55acc8415bbcc50c6.exe