Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 20:42
Behavioral task
behavioral1
Sample
ea7f31070336120fed10e55266c2e70610b05ef74113f40e2f0c0e28eb9f2588.exe
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ea7f31070336120fed10e55266c2e70610b05ef74113f40e2f0c0e28eb9f2588.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
ea7f31070336120fed10e55266c2e70610b05ef74113f40e2f0c0e28eb9f2588.exe
-
Size
2.5MB
-
MD5
8052a92f6ef07088030099bbb00f51e6
-
SHA1
9c911552a0a083d47b5368e87aaac9ff307d16b6
-
SHA256
ea7f31070336120fed10e55266c2e70610b05ef74113f40e2f0c0e28eb9f2588
-
SHA512
94a294fdf31ea37b7da6bffebc65d7422bfd19ea6d43477e64ed53739bfec23c48a069cd86af04abe5aeb2a7d0fd74d8a6b368ab666b10893c4f7b4111953a51
-
SSDEEP
49152:yT5fFNl8u/ypGA+ji/2+tfR6T475reXCLa/Qslo:cZFZw+ji+GoE7dqkbsl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2220-0-0x0000000000400000-0x0000000000C12000-memory.dmp upx behavioral2/memory/2220-1-0x0000000000400000-0x0000000000C12000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2220 ea7f31070336120fed10e55266c2e70610b05ef74113f40e2f0c0e28eb9f2588.exe 2220 ea7f31070336120fed10e55266c2e70610b05ef74113f40e2f0c0e28eb9f2588.exe