Analysis
-
max time kernel
160s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 20:36
Behavioral task
behavioral1
Sample
830cad8127bb51170ecb0f3f2449aedba7450283fa5b17b6a58ddd28d48e67cb.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
830cad8127bb51170ecb0f3f2449aedba7450283fa5b17b6a58ddd28d48e67cb.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
830cad8127bb51170ecb0f3f2449aedba7450283fa5b17b6a58ddd28d48e67cb.exe
-
Size
87KB
-
MD5
65895641dc7528e832f9c5ebb679bd30
-
SHA1
ba95b3b87deca4327c9ef96896a27adb511d3a45
-
SHA256
830cad8127bb51170ecb0f3f2449aedba7450283fa5b17b6a58ddd28d48e67cb
-
SHA512
9e1402c613941f9e7177efcb0342167d7eac7a0b51f990f73eb85cf74e8d2923a6dad597b269865cee43f87b20a86fad5d7a9060f379f2aacf0e97f98b0f59c3
-
SSDEEP
1536:Am5a+Y31jtJfTRELHDbj9vfXoviBkCLJhic/u6lgc8XLoD2lw1k4Yk4:A5+Y3zDkjXiGkqBuTlXED2Ykrk
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2088-132-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/2088-135-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2088 830cad8127bb51170ecb0f3f2449aedba7450283fa5b17b6a58ddd28d48e67cb.exe