Analysis
-
max time kernel
165s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:53
Static task
static1
Behavioral task
behavioral1
Sample
ad2ed160dd6e6a9b6cdbbe23e7de02bae16ff13b462c0dc3cc9223f15cbd1771.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad2ed160dd6e6a9b6cdbbe23e7de02bae16ff13b462c0dc3cc9223f15cbd1771.exe
Resource
win10v2004-20220812-en
General
-
Target
ad2ed160dd6e6a9b6cdbbe23e7de02bae16ff13b462c0dc3cc9223f15cbd1771.exe
-
Size
2.9MB
-
MD5
963f8d05c4d610cb90667346cbf868ca
-
SHA1
ef7c9cfd7804751ebf2afdf34854da7883d06afa
-
SHA256
ad2ed160dd6e6a9b6cdbbe23e7de02bae16ff13b462c0dc3cc9223f15cbd1771
-
SHA512
b424223c1bb063bb0927d80c945ff8c1c6b3b48b285a0faa2b93ae3e443e1601c26cf48c3958ddc26a654fb469a9335d1170ed7e38d00df955ab84737b60ee48
-
SSDEEP
49152:Igna78O353RKnI3V43VFk+s8KuqGaX0ToIBAUZLYu3E:E7R35QCVSVFHJBAUZLdE
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1188-56-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-59-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-58-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-61-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-63-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-60-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-67-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-65-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-69-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-73-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-71-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-75-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-77-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-79-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-81-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-83-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-85-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-87-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-89-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-91-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-93-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-95-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-97-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-99-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-101-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-102-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/1188-103-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
ad2ed160dd6e6a9b6cdbbe23e7de02bae16ff13b462c0dc3cc9223f15cbd1771.exepid process 1188 ad2ed160dd6e6a9b6cdbbe23e7de02bae16ff13b462c0dc3cc9223f15cbd1771.exe 1188 ad2ed160dd6e6a9b6cdbbe23e7de02bae16ff13b462c0dc3cc9223f15cbd1771.exe 1188 ad2ed160dd6e6a9b6cdbbe23e7de02bae16ff13b462c0dc3cc9223f15cbd1771.exe