Analysis
-
max time kernel
141s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 04:34
Behavioral task
behavioral1
Sample
64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d.exe
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d.exe
-
Size
13KB
-
MD5
8b44c50562010ba0e4c207952dbc9a12
-
SHA1
e5593ed5bdf694d99e77637f20b895af4a0c2ee2
-
SHA256
64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d
-
SHA512
f23640dac3c3f13786814624737e50c3dfa822ae124523a72df4c9fadb8065e1eb035138ecc641d829b4ea46e2d029d712b10c78c3e07a892e5b9d30a1db357b
-
SSDEEP
192:P8rz2CNzRHQTAHvULqtkeQAMh6NNpNNpuALo0F2:0eCNmTAHvU+i36NNpNNpe0F2
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1240-56-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1240-57-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1240 64b16a883f5cee78c7cf7500a870c24f7a6bcd51c87fe6d443846c3492a8745d.exe