Analysis
-
max time kernel
19s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:48
Static task
static1
Behavioral task
behavioral1
Sample
458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe
Resource
win10v2004-20221111-en
General
-
Target
458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe
-
Size
5.0MB
-
MD5
c1ee7f02c59a63b34e6e5736b6d8d1fb
-
SHA1
09b397e0ea5bc8e2e5b6cd1bbb90c4729ff0512d
-
SHA256
458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba
-
SHA512
67d374688e68e64df41456c2e4699dc64c8d9448593b9c485b6a7bd050d1b57d8fbf9270b186c6517fd267694900383fcabef42636a283e47752b1233b5e6bec
-
SSDEEP
98304:o8lH5PUpqNfKFty7JZNEgzX5ujKB6RNYXA77pjfeHzuaPt9xsvI2bUNZD0/B:pA6fKSlrxzXYjpRWXA7pjOzu+n6vI9Y
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1152-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1152-98-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exepid process 1152 458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe 1152 458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe 1152 458577fc2876d14c98f46653f8dba6071074d31d800afbf3b335113fcefa20ba.exe