Analysis
-
max time kernel
63s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:01
Behavioral task
behavioral1
Sample
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe
Resource
win10v2004-20221111-en
General
-
Target
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe
-
Size
548KB
-
MD5
4c7b140e6b696b2baff5bc1c6d7704a0
-
SHA1
f79927e430153a8594b2ce9b30522a180346f245
-
SHA256
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535
-
SHA512
c83197e020cc24065384f7147f15d8a2285edf6c1df706504ccda8af57d5c92272c2f68240350b18ae1e57a7aab6b124f801d78127d70908dbe7575c00eab5c7
-
SSDEEP
12288:inMDDWuca2BGPbpHGjym3EhR6fn4qbkxdMJ6oAlsNXodRgG6:O+Dh2BKb5+7Pn4q4xdMJnAlsSAG6
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2044-55-0x0000000000400000-0x0000000000566000-memory.dmp upx behavioral1/memory/2044-56-0x0000000000400000-0x0000000000566000-memory.dmp upx -
Processes:
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exepid process 2044 65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe 2044 65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe