Analysis
-
max time kernel
32s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 08:23
Behavioral task
behavioral1
Sample
9a5bb0396cfc8c563666ea5a8d4ed7981b47e6b533420e964dee6ffffcb1c560.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
9a5bb0396cfc8c563666ea5a8d4ed7981b47e6b533420e964dee6ffffcb1c560.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
9a5bb0396cfc8c563666ea5a8d4ed7981b47e6b533420e964dee6ffffcb1c560.exe
-
Size
67KB
-
MD5
c762eb9d8322e24e8a550ab6d6294f56
-
SHA1
58c629a6fbba40068fb2df81cd9c6f73924e24c5
-
SHA256
9a5bb0396cfc8c563666ea5a8d4ed7981b47e6b533420e964dee6ffffcb1c560
-
SHA512
5976a3526b9e503fceb971ea062228c36e602bc5098e33aef0dfb714b05b51dc878c56687934b278c23b49b5225f498e312577a779d464ee60714ba69c7fea0e
-
SSDEEP
768:/BrfAHm/WjDApp1qUjP/H2RFLPVU+bZB:/9fkQpqr9PVDZB
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1708-54-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1708-57-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 9a5bb0396cfc8c563666ea5a8d4ed7981b47e6b533420e964dee6ffffcb1c560.exe