Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-01-2023 19:38
Static task
static1
Behavioral task
behavioral1
Sample
ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe
-
Size
4.9MB
-
MD5
0e97c7109ddd0bf547e472db846834c4
-
SHA1
c29d87b40052e7a7b23a4aa84ae7f21ff014f083
-
SHA256
ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0
-
SHA512
8377b9e76c3431787e9e74b24e29f8c7274678893a9d93a3691bdf18d1305ab3b4a4570bd5d7177663055312fe7bfaf94992ab6daa4da1d9c9b75c2cd2d01c55
-
SSDEEP
49152:X4vihZi7UKfcYbLrVj9PbDTIfg6VKGCpdQ:Ivihw7UKhnDl6VK1pdQ
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1636-55-0x0000000002120000-0x0000000002156000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1636 ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe 1636 ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe