Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/02/2023, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe
Resource
win10v2004-20220901-en
General
-
Target
515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe
-
Size
1.1MB
-
MD5
064818470d2e0f263a673d5e7d351738
-
SHA1
610f962effedc098cafe8952cfed5bebffbcb071
-
SHA256
515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b
-
SHA512
2c0f19b5ef1103a70b8e93cb29e7ffbe2f86192214c5b150051f7fd3c454985cbee27f0ad83d35cc38b17dad4bad7e319ba63a9e5b388d787f9de81835968117
-
SSDEEP
12288:AZsvXdjl8SOCMv5SA04k57WQCyuXpdWYR5nWFpPoSYXm1:Ay9erCOAAfkFW/XpdYbKXm1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1356-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1356-101-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1356 515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe 1356 515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe 1356 515701b8f5bdc39d417ace35001ba73ea6481a6e90f12a5b3a1b7c0e485bfe3b.exe