Analysis
-
max time kernel
233s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 07:04
Behavioral task
behavioral1
Sample
45eaedf1d443551987870794a4981fefc1e22b797c26eb1a4e5c0386e6fdbf97.exe
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
45eaedf1d443551987870794a4981fefc1e22b797c26eb1a4e5c0386e6fdbf97.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
45eaedf1d443551987870794a4981fefc1e22b797c26eb1a4e5c0386e6fdbf97.exe
-
Size
573KB
-
MD5
9b5a75b271b8a0ee3023e535c03104d8
-
SHA1
141dd15e0266aadbaf02d49380514ac1dff8ba18
-
SHA256
45eaedf1d443551987870794a4981fefc1e22b797c26eb1a4e5c0386e6fdbf97
-
SHA512
fd26128b3bdea799c2723741f0778b04707ba13829c63fa9690b41dd5948a47a217e74695b997382c0374706e5fc9a1a79b098ee8774a23f846f9e9f9e6163eb
-
SSDEEP
12288:CZJazWt8PzEYswOD4SFEPWpMuQ8RD8tR0+neAWFhq5O2MB9gTGhoS3:dPzEYswOkygWpM1gDeO+eAWHCO2kS2
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3132-132-0x0000000000400000-0x0000000000559000-memory.dmp upx behavioral2/memory/3132-133-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-136-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-135-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-138-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-137-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-140-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-142-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-144-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-146-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-148-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-150-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-152-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-156-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-154-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-158-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-160-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-162-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-164-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-166-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-168-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-170-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-172-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-174-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-176-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-178-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3132-179-0x0000000000400000-0x0000000000559000-memory.dmp upx behavioral2/memory/3132-180-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3132 45eaedf1d443551987870794a4981fefc1e22b797c26eb1a4e5c0386e6fdbf97.exe 3132 45eaedf1d443551987870794a4981fefc1e22b797c26eb1a4e5c0386e6fdbf97.exe 3132 45eaedf1d443551987870794a4981fefc1e22b797c26eb1a4e5c0386e6fdbf97.exe