Analysis
-
max time kernel
18s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 11:21
Behavioral task
behavioral1
Sample
f668d8a4003b4d4ebae407e045c7f8cbbe0fa376bd1a94d4d219aa2c76da1c36.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f668d8a4003b4d4ebae407e045c7f8cbbe0fa376bd1a94d4d219aa2c76da1c36.exe
Resource
win10v2004-20221111-en
2 signatures
150 seconds
General
-
Target
f668d8a4003b4d4ebae407e045c7f8cbbe0fa376bd1a94d4d219aa2c76da1c36.exe
-
Size
14KB
-
MD5
1c8fb5218fc1cf7cddf939f6697875bc
-
SHA1
bad25206cfe7299d2a5647922f8edecce6f9fb77
-
SHA256
f668d8a4003b4d4ebae407e045c7f8cbbe0fa376bd1a94d4d219aa2c76da1c36
-
SHA512
947e241b76248d020f1727ef0dae457f88b4b930928848231cc3c28ba8d683a5fe80fca04881d8e737bc15e7be27e8725c803c67928aea00fcd08c11bf53a2cf
-
SSDEEP
192:4s7j1IPppF+0j+gMPY49yfqRNZDHsPq+TF:X8ppM0eyIOPlTF
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1836-56-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1836-57-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1836 f668d8a4003b4d4ebae407e045c7f8cbbe0fa376bd1a94d4d219aa2c76da1c36.exe