Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 16:00
Behavioral task
behavioral1
Sample
0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb.exe
-
Size
179KB
-
MD5
05ae50c1147751ebb890ab2a57c74720
-
SHA1
97ba900be423527d0226b9ee7b79d0f8eee25331
-
SHA256
0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb
-
SHA512
f8c965548ad5506d4e03abb4fa4eb2b243d09b3a3af38427cd48aae06eaecb709526d130abdb3103505bc450650499651f386b36633cf1a5669d030a953c0e95
-
SSDEEP
3072:YtWGRBAGvY6EMwCmWOJcyFTBfttg5SUq+MEICIOGDAD:Y1zvZiZFJcyFTBlWMEHIOEA
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1672-55-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1672 0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb.exe 1672 0a3e5b572908df1bde58bdff607284a73b17e54453674fd7e6e8f7db425a97eb.exe