Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21-08-2023 08:54
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
220KB
-
MD5
ce9ab2cd5999bdc1ee65174b1f60b34b
-
SHA1
323f0eba56345e47210a6b96fe136aa8548d2a08
-
SHA256
7c46943039c05a9ef940d1e44cbb38de7e2074154423def161c1a62cad5bd082
-
SHA512
7ffba3bbd57e450dd45ab1b2ad3940f04f5784b4fbea32552681ab44b5a78b95e088d634e43ce3df9d9aa3196fc2ce51baa8caaeba9b4b16f7164192d169f9b7
-
SSDEEP
6144:BMKoXxYIpA3KvOxgaIbYegSi3XjwUzxb:BMKgpC3KvOobYegS2t9
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2616-54-0x0000000000BD0000-0x0000000000C66000-memory.dmp upx behavioral1/memory/2616-56-0x0000000000BD0000-0x0000000000C66000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 tmp.exe 2616 tmp.exe