Analysis
-
max time kernel
151s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 01:01
Behavioral task
behavioral1
Sample
73435379f114d1396cde3b618afad7d7cbf0638ed2b82f38f90868bd72ace5de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73435379f114d1396cde3b618afad7d7cbf0638ed2b82f38f90868bd72ace5de.exe
Resource
win10v2004-20221111-en
General
-
Target
73435379f114d1396cde3b618afad7d7cbf0638ed2b82f38f90868bd72ace5de.exe
-
Size
360KB
-
MD5
de75a386c8ff5623bfe790c957da0dff
-
SHA1
b89524c01d6524a52e90c632d4b9b0ec427238d2
-
SHA256
73435379f114d1396cde3b618afad7d7cbf0638ed2b82f38f90868bd72ace5de
-
SHA512
c7282a593d039b28f7a9be6b2ef22c5b845c589464467b067436f79096bfcde3cdf46f15e7f566f91f17fb95696cd800047b05d8eb3bbb609929bbacfbf01bb0
-
SSDEEP
6144:pxaSzUZOUYk3TnVjw+BC/cJyaZDx+zaUP7jEJPbaO7b7jnuvFT0dOvFCOABR95fX:pYyUxljn1wMKcJzDx+zHEJDaO776wdOe
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4344-132-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/4344-133-0x0000000000400000-0x00000000004F2000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4344 73435379f114d1396cde3b618afad7d7cbf0638ed2b82f38f90868bd72ace5de.exe