Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 19:46
Behavioral task
behavioral1
Sample
96447cf0b0bfadc701a8bd1f0769a4a15a27e764ab98eb29fc6d3ec266d61a15.exe
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
96447cf0b0bfadc701a8bd1f0769a4a15a27e764ab98eb29fc6d3ec266d61a15.exe
Resource
win10v2004-20230221-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
96447cf0b0bfadc701a8bd1f0769a4a15a27e764ab98eb29fc6d3ec266d61a15.exe
-
Size
1.0MB
-
MD5
8657027bf0a394fe95a8ca6afb5e690b
-
SHA1
48873f5b6e30ac12d63ce49bb9737d653f770ae4
-
SHA256
96447cf0b0bfadc701a8bd1f0769a4a15a27e764ab98eb29fc6d3ec266d61a15
-
SHA512
31153c0ac4a2f2d0fb67d50406d2796a4a6f638fa8feaf6427eee303b1d4dfd5915873b00220b3c6bc86d20247c27b2e614d3c2edd7cea8991c90c08001f9669
-
SSDEEP
24576:iyeLi4j7G8f/pHPZdFajjVdVojzpTPDo:irL5G4KVdVojlT0
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2040-54-0x0000000010000000-0x000000001000B000-memory.dmp upx behavioral1/memory/2040-55-0x0000000010000000-0x000000001000B000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
96447cf0b0bfadc701a8bd1f0769a4a15a27e764ab98eb29fc6d3ec266d61a15.exepid process 2040 96447cf0b0bfadc701a8bd1f0769a4a15a27e764ab98eb29fc6d3ec266d61a15.exe