Analysis
-
max time kernel
163s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:01
Behavioral task
behavioral1
Sample
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe
Resource
win10v2004-20221111-en
General
-
Target
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe
-
Size
548KB
-
MD5
4c7b140e6b696b2baff5bc1c6d7704a0
-
SHA1
f79927e430153a8594b2ce9b30522a180346f245
-
SHA256
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535
-
SHA512
c83197e020cc24065384f7147f15d8a2285edf6c1df706504ccda8af57d5c92272c2f68240350b18ae1e57a7aab6b124f801d78127d70908dbe7575c00eab5c7
-
SSDEEP
12288:inMDDWuca2BGPbpHGjym3EhR6fn4qbkxdMJ6oAlsNXodRgG6:O+Dh2BKb5+7Pn4q4xdMJnAlsSAG6
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1680-132-0x0000000000400000-0x0000000000566000-memory.dmp upx behavioral2/memory/1680-133-0x0000000000400000-0x0000000000566000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exepid process 1680 65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe 1680 65c3bb5c9de063dff2dff929c6f20e96f176cc82bb180e8498285837cfcbd535.exe