Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2023, 18:33
Behavioral task
behavioral1
Sample
2cdd34fe161c3ef8ba5f2030767f597733c7aabae6c041db81e7cd261daf51e5.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2cdd34fe161c3ef8ba5f2030767f597733c7aabae6c041db81e7cd261daf51e5.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
2cdd34fe161c3ef8ba5f2030767f597733c7aabae6c041db81e7cd261daf51e5.exe
-
Size
324KB
-
MD5
ad2c915d69c3c804e5c73985f077dadb
-
SHA1
ca45fe73af13a461cc2bb3954b278faaf10f8879
-
SHA256
2cdd34fe161c3ef8ba5f2030767f597733c7aabae6c041db81e7cd261daf51e5
-
SHA512
b6f03f1ad98a8a4cfc64ec7152c6533869ba060d28cf7a55a70fff54e9bcb667f9be91f806bc898760598d3babcfa5924e4a3c85c2449582d8e99191e8e2c4dc
-
SSDEEP
6144:hPXEckZPC+CJq52imC24QafvaxZR00eWJ8G9TCG:h/1kJaq5cT4QaKy
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1064-132-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1064-133-0x0000000000400000-0x000000000049A000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1064 2cdd34fe161c3ef8ba5f2030767f597733c7aabae6c041db81e7cd261daf51e5.exe 1064 2cdd34fe161c3ef8ba5f2030767f597733c7aabae6c041db81e7cd261daf51e5.exe