Analysis
-
max time kernel
28s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 17:25
Behavioral task
behavioral1
Sample
db9d07f6f985d42e607bd8416e247701bbb183c89e592c3bb67ce6c365208169.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
db9d07f6f985d42e607bd8416e247701bbb183c89e592c3bb67ce6c365208169.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
db9d07f6f985d42e607bd8416e247701bbb183c89e592c3bb67ce6c365208169.exe
-
Size
111KB
-
MD5
3bfcaa960f40af7ea98811f2ee1cad99
-
SHA1
56b47bbd48332c7ce9c43a141d722e10463470a6
-
SHA256
db9d07f6f985d42e607bd8416e247701bbb183c89e592c3bb67ce6c365208169
-
SHA512
0f2e5cd886d79672e0e0bd52d04e9ce38cc0bfbc45a11802d2f0a8b8f0d4cdc629670abfd3a3e272e2409f4b716494dd668f5197674de6f4647d6761851b5ae0
-
SSDEEP
3072:JkJXHBgRnsZfaK40HrA/ElT6XV9CZ1zN/1k/VUPx2nf6tY:Cxbgh0HuITOVs7NmVUP8y
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1220-56-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1220-57-0x0000000000400000-0x000000000044E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1220 db9d07f6f985d42e607bd8416e247701bbb183c89e592c3bb67ce6c365208169.exe