Analysis
-
max time kernel
12s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 15:54
Behavioral task
behavioral1
Sample
739c2dd76d65ba83fb9edaf55ebb00d201c5272413f941ad5d161e3177685174.exe
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
739c2dd76d65ba83fb9edaf55ebb00d201c5272413f941ad5d161e3177685174.exe
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
739c2dd76d65ba83fb9edaf55ebb00d201c5272413f941ad5d161e3177685174.exe
-
Size
81KB
-
MD5
66f0cd3f56141d471275e6fd39a5bb1f
-
SHA1
7af51c1f449128588c572ad7b8b4b894e1cdf750
-
SHA256
739c2dd76d65ba83fb9edaf55ebb00d201c5272413f941ad5d161e3177685174
-
SHA512
0dbd0bfd72c356c0a8f19035c00986d0221819091e459ad71eee1dda989083455c335edcbd5ca295229f4d31fd4711d88b0778fea1e6538ade73d9dd55e59334
-
SSDEEP
1536:/7Og8zlJJTHbcL/4Syz0FNk4+E9B4S9xQ10zichA0G7/VNEsDiN/Ry2rY1:T74TIlBFZJ9B4SOpeM9NXeg4Y1
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1128-56-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1128 739c2dd76d65ba83fb9edaf55ebb00d201c5272413f941ad5d161e3177685174.exe