Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 10:06
Behavioral task
behavioral1
Sample
c979621b1555620273d490fd55df721f939a8255a88b7ca5e34a2921e224e315.exe
Resource
win7-20230824-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
c979621b1555620273d490fd55df721f939a8255a88b7ca5e34a2921e224e315.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
c979621b1555620273d490fd55df721f939a8255a88b7ca5e34a2921e224e315.exe
-
Size
1.5MB
-
MD5
10924e03c5fd068868367455bdc91c95
-
SHA1
9655cbf1fe339eeab33ef56cd05c1822247f3397
-
SHA256
c979621b1555620273d490fd55df721f939a8255a88b7ca5e34a2921e224e315
-
SHA512
5acaa6af3fd34ba9e2860fc6c977476429e56a6ad6a8a1db1f8f46607c2e4667df3cefa33ffea8d568ff0758a862969c2f19007c26327475f4f4b249b3c06cf7
-
SSDEEP
49152:6AZQ3Fq+usSlPfOwPpMRQO4eAsqWH6zRM:6Ai3kpsihPpM3fd6zRM
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4176-0-0x0000000000400000-0x0000000000ACD000-memory.dmp upx behavioral2/memory/4176-2-0x0000000000400000-0x0000000000ACD000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4176 c979621b1555620273d490fd55df721f939a8255a88b7ca5e34a2921e224e315.exe