Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2023 19:20
Static task
static1
Behavioral task
behavioral1
Sample
7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5.exe
Resource
win10v2004-20230221-en
General
-
Target
7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5.exe
-
Size
52KB
-
MD5
d693d45f1e26306483f063cb34154e1e
-
SHA1
0dfbe25d556df4069c60cd5b83504a6e34529b75
-
SHA256
7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5
-
SHA512
e394a2c9b5cc0328d4eaea68eaff24a12bd2f787e875c0c89d4ff3c81998a0f33fdb6544c43906cc25c8a329bf1e122f1e8710a8d5e0201980a31f878ee1c4b0
-
SSDEEP
768:UMVDD8343Cl57NP/H4FWUSj6dMy+ZeXkUy7jcxCV6d4fhsnT3T+A19U:tDD8IylNVmSDjQ54psl9U
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4224 7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5.exe 4224 7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4224 7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5.exe"C:\Users\Admin\AppData\Local\Temp\7334beae6544d776a8f18e7c549cecf37e1e5165f7d02aa5b8f399bef78adcb5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4224