Analysis
-
max time kernel
141s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2023, 19:33
Behavioral task
behavioral1
Sample
SWSB106R01.exe
Resource
win7-20230220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
SWSB106R01.exe
Resource
win10v2004-20230220-en
2 signatures
150 seconds
General
-
Target
SWSB106R01.exe
-
Size
179KB
-
MD5
85a69f695c714be5df11f764e2b3ef0e
-
SHA1
32d32593b034e4efebfd946b38ba0698d868e84e
-
SHA256
9ec9132121530769a0097a33c83bf39d2afa865c3ef02671053bbbc46d6690eb
-
SHA512
2f686864189eea3e60a9e6cdf1a2e4c0a092a509206079920438598f63efd47ea1c9cbdb70c3154215a19d928246ba30dc516a29eeeff51d0c9ea3e58947cbdf
-
SSDEEP
3072:7fGouuIW1pA147j0BCrcqj7/mNof/SVEM0xUR7TWJNVD:jnfIW1pDj0orcqjbmNof/SVEzxURPWJ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1720-54-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-55-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-56-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-57-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-58-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-59-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-60-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-61-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-62-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-63-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-64-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-65-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-66-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-67-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-68-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1720-69-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1720 SWSB106R01.exe 1720 SWSB106R01.exe