Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 15:51
Behavioral task
behavioral1
Sample
73c40185bcdecaf4fe2ea04da00b0714534250f73f441bed142c73e402ebc214.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
73c40185bcdecaf4fe2ea04da00b0714534250f73f441bed142c73e402ebc214.exe
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
73c40185bcdecaf4fe2ea04da00b0714534250f73f441bed142c73e402ebc214.exe
-
Size
775KB
-
MD5
4a86872a6701bb8cf88e26690e760724
-
SHA1
2db150fbe005b6c4737c38628b11c0807edd4e05
-
SHA256
73c40185bcdecaf4fe2ea04da00b0714534250f73f441bed142c73e402ebc214
-
SHA512
db2328fa49eb0c3c1c6417ec60afa3f9941805f3296aea53d98304cc9ef68d6c3d2bb703bc1c7926c288fd9a0a89ee3b3bd8729c3037062d8318cb53fca68eb4
-
SSDEEP
24576:3F2FPGlM8ZpK0riKiRIh6SSKjbwKUoOwiE4+/o:IsXimiSMSSK/fVj4+/o
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1316-132-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/1316-133-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1316 73c40185bcdecaf4fe2ea04da00b0714534250f73f441bed142c73e402ebc214.exe 1316 73c40185bcdecaf4fe2ea04da00b0714534250f73f441bed142c73e402ebc214.exe