Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 12:14
Behavioral task
behavioral1
Sample
7572787edff0398ca950741315437463407e1ce408579e412aa217bc00106afe.exe
Resource
win7-20220901-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7572787edff0398ca950741315437463407e1ce408579e412aa217bc00106afe.exe
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
7572787edff0398ca950741315437463407e1ce408579e412aa217bc00106afe.exe
-
Size
298KB
-
MD5
11c86b8568065a214ee1e425609a7700
-
SHA1
11684d3ee9241ac961c82295543ba480f9ad3118
-
SHA256
7572787edff0398ca950741315437463407e1ce408579e412aa217bc00106afe
-
SHA512
9c5f56c6a8b953a0f6276d8012c7b3b06903be4856f93652a3bea13a8c1c7df15095f32a8d50328410a2bee9e50c5d4605b9a681c6f49fa8afcf931ca93627e6
-
SSDEEP
6144:zFl3yDTjdeq7hmRK0I+IhqYU1tacgG/KeQffIgNxcxbhJECpJKHAUz5:zFl3y9h0uFUXY5fnqnnUd
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1632-55-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1632-56-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1632 7572787edff0398ca950741315437463407e1ce408579e412aa217bc00106afe.exe 1632 7572787edff0398ca950741315437463407e1ce408579e412aa217bc00106afe.exe 1632 7572787edff0398ca950741315437463407e1ce408579e412aa217bc00106afe.exe