Analysis
-
max time kernel
235s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 02:58
Behavioral task
behavioral1
Sample
992df34b1efbfddbe208d967c560aa46b6b69897d6b63ba769e9280e44eadd94.exe
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
992df34b1efbfddbe208d967c560aa46b6b69897d6b63ba769e9280e44eadd94.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
992df34b1efbfddbe208d967c560aa46b6b69897d6b63ba769e9280e44eadd94.exe
-
Size
488KB
-
MD5
1b0ffec49c4d3511e3bf609f72856edb
-
SHA1
c8b488fc0804137d3f42da15de278e978d3819a7
-
SHA256
992df34b1efbfddbe208d967c560aa46b6b69897d6b63ba769e9280e44eadd94
-
SHA512
88f5b29f49355682fea1a0dfc94a2944b5bfad3588a2ddf4c86e6b704e01fb81cd57993053eda5e74b25a0facab95e143d97082ffd077696e4aee0aff3c978f1
-
SSDEEP
12288:aYDcinnEGatfM1rkNSY7gedUSLk3WnKdRJC2S6f:aYAinnV1ESkUSo3LdRJC
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1640-55-0x0000000000400000-0x000000000054B000-memory.dmp vmprotect behavioral1/memory/1640-57-0x0000000000400000-0x000000000054B000-memory.dmp vmprotect -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
992df34b1efbfddbe208d967c560aa46b6b69897d6b63ba769e9280e44eadd94.exepid process 1640 992df34b1efbfddbe208d967c560aa46b6b69897d6b63ba769e9280e44eadd94.exe 1640 992df34b1efbfddbe208d967c560aa46b6b69897d6b63ba769e9280e44eadd94.exe