Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
c2c9e2dace0bd37d84223c4676d1170281490ae77e55ec89c5373f3312173729.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c2c9e2dace0bd37d84223c4676d1170281490ae77e55ec89c5373f3312173729.exe
Resource
win10v2004-20220812-en
General
-
Target
c2c9e2dace0bd37d84223c4676d1170281490ae77e55ec89c5373f3312173729.exe
-
Size
1.5MB
-
MD5
eb6e25069c0c716cbe20b0e68979ea4e
-
SHA1
1be24ca97a7f67901df72da205c0b2c3ea26dba6
-
SHA256
c2c9e2dace0bd37d84223c4676d1170281490ae77e55ec89c5373f3312173729
-
SHA512
8adc1c5ffa5125371c5c6fe0958737f83a8961d3607263aa54833dcd8128a868f026a01f07c6489b9d20145aba5eb12c3ae864b5a73caf48e3ea71f432cf388a
-
SSDEEP
12288:7PjfusMrlSyEeLQJWtnmre82s5Izry20Hha02ock0eQFsvO6hjY+Id3z6+FgLd0i:/fdMrlSj2QGmi8YuJMVFsts3eKa0+/lh
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1380-56-0x0000000000400000-0x00000000005B6000-memory.dmp upx behavioral1/memory/1380-57-0x0000000000400000-0x00000000005B6000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1380 c2c9e2dace0bd37d84223c4676d1170281490ae77e55ec89c5373f3312173729.exe