Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 05:25
Behavioral task
behavioral1
Sample
bd94ac3578977dfc6206ca31e0119c16b4bb636a56b4523821cd54aef60f2aa4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bd94ac3578977dfc6206ca31e0119c16b4bb636a56b4523821cd54aef60f2aa4.exe
Resource
win10v2004-20230220-en
General
-
Target
bd94ac3578977dfc6206ca31e0119c16b4bb636a56b4523821cd54aef60f2aa4.exe
-
Size
1.1MB
-
MD5
f46620d6b78e3c846ecab9583ddc9bb9
-
SHA1
ccf543e2a797c339b1bb2ea13f90e7c2909c59cb
-
SHA256
bd94ac3578977dfc6206ca31e0119c16b4bb636a56b4523821cd54aef60f2aa4
-
SHA512
e23bdd199417709b30b38b6c241a0f534dd5ad6d5720b4e78b0af523089ea2d80e9afb1883da70f800348d88eef29a0004637857a7e6a35ea580762964093992
-
SSDEEP
768:NLpS+WLzHUsbpigGL74JZCWEeVrGflnx7mpKVaP/qEP1LXuqi7K8u+QsYia4:N11WLzHdU5LOlNIx7hVaPSEpeq8zo74
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1872-135-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1872-137-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1872-146-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1872 bd94ac3578977dfc6206ca31e0119c16b4bb636a56b4523821cd54aef60f2aa4.exe 1872 bd94ac3578977dfc6206ca31e0119c16b4bb636a56b4523821cd54aef60f2aa4.exe