Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 14:26
Behavioral task
behavioral1
Sample
cce0d3401e5080a50848bdd0a2566e1289e676b34be83ac851fde49fa55e9182.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
cce0d3401e5080a50848bdd0a2566e1289e676b34be83ac851fde49fa55e9182.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
cce0d3401e5080a50848bdd0a2566e1289e676b34be83ac851fde49fa55e9182.exe
-
Size
14KB
-
MD5
b4f742089c5fb4fc09ca1899c6960b09
-
SHA1
8ee7bf52c3748a6f30f8ecc83ea79171a45c9074
-
SHA256
cce0d3401e5080a50848bdd0a2566e1289e676b34be83ac851fde49fa55e9182
-
SHA512
a6b5743ab049298901d9da77ef6465c6e8139f5eed77827329714699d50fc1e8b4756f69d8f50723d8ed6994ac11dc4fc481e27b39568d5aeae981b35129510d
-
SSDEEP
192:TJHvJy5s3dpCSxfnaPais9dfZIZx89gB7AIIs4Wbsr7Ur6fT2f:lHv9+Sxfms9dr47BbSXM
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/288-54-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/288-55-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 288 cce0d3401e5080a50848bdd0a2566e1289e676b34be83ac851fde49fa55e9182.exe 288 cce0d3401e5080a50848bdd0a2566e1289e676b34be83ac851fde49fa55e9182.exe