Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
ad62550dc3640852f5638ed4c97fa9235cce37daa7ecf5fa9aa5519ea7d38cea.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ad62550dc3640852f5638ed4c97fa9235cce37daa7ecf5fa9aa5519ea7d38cea.exe
Resource
win10v2004-20230915-en
General
-
Target
ad62550dc3640852f5638ed4c97fa9235cce37daa7ecf5fa9aa5519ea7d38cea.exe
-
Size
940KB
-
MD5
e8d391ada4a8d5cf7756ecb22dbd670b
-
SHA1
e820c7b0ceeee8413355216dced3dce43af61add
-
SHA256
ad62550dc3640852f5638ed4c97fa9235cce37daa7ecf5fa9aa5519ea7d38cea
-
SHA512
e5523c50b504f4c8aec01095685c3b3785ec1494f59e5ae4fb2539c96ff6360a20e0503a5cbbc688716b3724329a6ba8c9218163f8f10610e4fd2bc4dc2d6907
-
SSDEEP
24576:rSQWtlIZaYS/AWP918xIACV8ld6LBFzSMAea9:rSgZEAWF1gRld6rNry
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2696-1-0x0000000010000000-0x000000001001E000-memory.dmp upx behavioral1/memory/2696-3-0x00000000002A0000-0x00000000002AB000-memory.dmp upx behavioral1/memory/2696-4-0x00000000002A0000-0x00000000002AB000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2696 ad62550dc3640852f5638ed4c97fa9235cce37daa7ecf5fa9aa5519ea7d38cea.exe 2696 ad62550dc3640852f5638ed4c97fa9235cce37daa7ecf5fa9aa5519ea7d38cea.exe