Analysis
-
max time kernel
271s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 01:34
Behavioral task
behavioral1
Sample
e84f7ba7f80b243bbbde3cc50175862316b1b651a83ccfb958270414ac2e98bd.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e84f7ba7f80b243bbbde3cc50175862316b1b651a83ccfb958270414ac2e98bd.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e84f7ba7f80b243bbbde3cc50175862316b1b651a83ccfb958270414ac2e98bd.exe
-
Size
21KB
-
MD5
c2b0a2e3011cd1105e7881e99670aa6d
-
SHA1
b04319076c2b0ea26f39e27dead4f371e259d93e
-
SHA256
e84f7ba7f80b243bbbde3cc50175862316b1b651a83ccfb958270414ac2e98bd
-
SHA512
90cb73e82dda6ed673a64922f98741c735f1031f798e82806f158e5e5b9a2fd8daaef5a48f80b4c0b61f5725258bde9631ea65d3ed9be47a42f10240801b93cd
-
SSDEEP
384:ToD7A9QAAVk00LhMkiHSdCkgKPhY4lMm1bHo0CWG2ELmB2s:ToD7A4Vk00l/rdxY4HcMGZLY2
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3560-134-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/3560-135-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3560 e84f7ba7f80b243bbbde3cc50175862316b1b651a83ccfb958270414ac2e98bd.exe 3560 e84f7ba7f80b243bbbde3cc50175862316b1b651a83ccfb958270414ac2e98bd.exe 3560 e84f7ba7f80b243bbbde3cc50175862316b1b651a83ccfb958270414ac2e98bd.exe