Analysis
-
max time kernel
70s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
f169fb92b997077c43bbc4053cdb3e462f52c2a16732022658bdde273d795e5e.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f169fb92b997077c43bbc4053cdb3e462f52c2a16732022658bdde273d795e5e.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
f169fb92b997077c43bbc4053cdb3e462f52c2a16732022658bdde273d795e5e.exe
-
Size
2.1MB
-
MD5
973d14c08e57a7744a2feb27f72ff2d9
-
SHA1
4458d840b6fc96ebc7489ae305f7b91609906e82
-
SHA256
f169fb92b997077c43bbc4053cdb3e462f52c2a16732022658bdde273d795e5e
-
SHA512
fc64d9f2929f4e88c7e5c0bfa4d9b4c46899bfd1f786eb0edd35017c19693115ed09a35502c993386cea255389fb8571c16723d3bea0fa8f04da3acf3ea78c95
-
SSDEEP
49152:XfiNYFpFZZoWGS4vJg1R0bBc+FGqR0bBc+3:iKX8vJgFb
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1896-55-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-56-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-57-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-61-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-65-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-67-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-73-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-75-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-77-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-81-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-79-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-83-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-87-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-91-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-97-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-95-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-93-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-89-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-85-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-71-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-69-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-63-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-59-0x00000000003C0000-0x00000000003FE000-memory.dmp upx behavioral1/memory/1896-98-0x00000000003C0000-0x00000000003FE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1896 f169fb92b997077c43bbc4053cdb3e462f52c2a16732022658bdde273d795e5e.exe 1896 f169fb92b997077c43bbc4053cdb3e462f52c2a16732022658bdde273d795e5e.exe 1896 f169fb92b997077c43bbc4053cdb3e462f52c2a16732022658bdde273d795e5e.exe