Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2023, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe
-
Size
4.9MB
-
MD5
0e97c7109ddd0bf547e472db846834c4
-
SHA1
c29d87b40052e7a7b23a4aa84ae7f21ff014f083
-
SHA256
ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0
-
SHA512
8377b9e76c3431787e9e74b24e29f8c7274678893a9d93a3691bdf18d1305ab3b4a4570bd5d7177663055312fe7bfaf94992ab6daa4da1d9c9b75c2cd2d01c55
-
SSDEEP
49152:X4vihZi7UKfcYbLrVj9PbDTIfg6VKGCpdQ:Ivihw7UKhnDl6VK1pdQ
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4332-132-0x0000000004470000-0x00000000044A6000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4332 ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe 4332 ced3cf08661f9fd0fd4192ac49f2bc6b5cdc1f45a14b03dbf40661ae7f6975c0.exe