Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 20:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5ca514902a4c82exeexeexeex.exe
Resource
win7-20230703-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5ca514902a4c82exeexeexeex.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
5ca514902a4c82exeexeexeex.exe
-
Size
3.1MB
-
MD5
5ca514902a4c823dabd5494f221ea1d8
-
SHA1
0a42a60e6f7293ec2d2a2fde27e14f7acfeabf6d
-
SHA256
4e1e3f5366ad0862b1a998bfa0adc5fe8fa857c0e99cce9129000fcdb6df1e85
-
SHA512
b759b66f577ae51ded5f936d5ef2f81cd0aade99330ba7269a3fc78c95aa854b50ab5b07aae98a237134ffc1e6082b3f39d7b6e02ba0fa76d509851b088aa919
-
SSDEEP
49152:orlfl+DggBsvpepA8kkzTA3M7TFpsvD/DX+y4onCYDoD5:8N+DNavpepA1kv9svD/D+donCYUV
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4812-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-140-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-142-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-148-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-150-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-160-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-176-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4812-178-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4812 5ca514902a4c82exeexeexeex.exe 4812 5ca514902a4c82exeexeexeex.exe 4812 5ca514902a4c82exeexeexeex.exe