Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 14:09
Behavioral task
behavioral1
Sample
4718b51e3ea07387cca50eaa64e04558f7ad200295f9dad2f091a7255a9b70ba.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4718b51e3ea07387cca50eaa64e04558f7ad200295f9dad2f091a7255a9b70ba.exe
Resource
win10v2004-20230703-en
General
-
Target
4718b51e3ea07387cca50eaa64e04558f7ad200295f9dad2f091a7255a9b70ba.exe
-
Size
1.2MB
-
MD5
ff3f13dfdd4af96d0de2564a8ca02fb3
-
SHA1
4abb8016cfe15734a04d3fc7d3ef804431dfb41c
-
SHA256
4718b51e3ea07387cca50eaa64e04558f7ad200295f9dad2f091a7255a9b70ba
-
SHA512
e4b4ff867b0fbe57f65cc9d14c27baa2fa0be1e7e95479fb6d91b56c9ee9b36fce832fbb59e7bbb5d4d5d60855aff77e9d91b56a853b7c963466ba4c0cd1fe97
-
SSDEEP
24576:ym0t2pXm6LaZ731xxftArLKnox8jHq/YsTDUg/khrjurgKdbWxcF5PePoE3Np:yTt2/LC1ZArWnI8Tq/YyDUg/kd9Kd2c0
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1992-0-0x0000000000400000-0x00000000008CF000-memory.dmp upx behavioral1/memory/1992-1-0x0000000000400000-0x00000000008CF000-memory.dmp upx behavioral1/memory/1992-3-0x0000000000400000-0x00000000008CF000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1992 4718b51e3ea07387cca50eaa64e04558f7ad200295f9dad2f091a7255a9b70ba.exe 1992 4718b51e3ea07387cca50eaa64e04558f7ad200295f9dad2f091a7255a9b70ba.exe