Analysis
-
max time kernel
55s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 12:17
Behavioral task
behavioral1
Sample
bf09910422bc2b93972d92416749f3292f7d62b752f22e6b020c4997f7e4f898.exe
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bf09910422bc2b93972d92416749f3292f7d62b752f22e6b020c4997f7e4f898.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
bf09910422bc2b93972d92416749f3292f7d62b752f22e6b020c4997f7e4f898.exe
-
Size
1.1MB
-
MD5
e1a9da163fdc214e6d99e227c1ae8e32
-
SHA1
f9beb7427af43c5f3e60d644fec7370e2957419c
-
SHA256
bf09910422bc2b93972d92416749f3292f7d62b752f22e6b020c4997f7e4f898
-
SHA512
901a70c673bd4a7287eaf6267c1cff0fdb4c9dde7157f85dddca248f8138029478fcc00c5eeadcd94dbeb3dae0e02cc7562d8660a2dfed47e1f2798634abef4f
-
SSDEEP
24576:H5/bRnxSAYkyNzOaV5Iexgo99pdHHDZFIjl9M:Z/ZYks7Dr993Hj7M
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1704-55-0x0000000000400000-0x0000000000719000-memory.dmp vmprotect behavioral1/memory/1704-57-0x0000000000400000-0x0000000000719000-memory.dmp vmprotect behavioral1/memory/1704-58-0x0000000000400000-0x0000000000719000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
bf09910422bc2b93972d92416749f3292f7d62b752f22e6b020c4997f7e4f898.exepid process 1704 bf09910422bc2b93972d92416749f3292f7d62b752f22e6b020c4997f7e4f898.exe 1704 bf09910422bc2b93972d92416749f3292f7d62b752f22e6b020c4997f7e4f898.exe