Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 00:06
Behavioral task
behavioral1
Sample
ada9eec959a7fc9637a1546b6333db0fa684082b0d6354ea727d5b38f55634d5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ada9eec959a7fc9637a1546b6333db0fa684082b0d6354ea727d5b38f55634d5.exe
Resource
win10v2004-20220812-en
General
-
Target
ada9eec959a7fc9637a1546b6333db0fa684082b0d6354ea727d5b38f55634d5.exe
-
Size
363KB
-
MD5
66e45df5b5f115a409f1c65db066da16
-
SHA1
e05f9cf849fbfd6d5506a94eaa44256ac76d11d8
-
SHA256
ada9eec959a7fc9637a1546b6333db0fa684082b0d6354ea727d5b38f55634d5
-
SHA512
c3dae29118e3060eb7d50db71b930cb5fee94a88c20d62d45c0a9e8dc956f6fefc6acbfe6fcdb8515143ece1e8b50b241dc756d384ebd50efe503d97bba302b3
-
SSDEEP
6144:V3NlPYFMITLl1kiKDJrf8Ep1RwqTjDUfG7ezksIbdF+fB8HCgYRnoiz4HKX/U2kq:VdCFfL/KDhfN1RfXU+7BsIbT+58HRgnH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3320-132-0x0000000000380000-0x00000000004F5000-memory.dmp upx behavioral2/memory/3320-133-0x0000000000380000-0x00000000004F5000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3320 ada9eec959a7fc9637a1546b6333db0fa684082b0d6354ea727d5b38f55634d5.exe 3320 ada9eec959a7fc9637a1546b6333db0fa684082b0d6354ea727d5b38f55634d5.exe