Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 02:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9ae3403e0b79dd964868658c1ab28b32751dd2764ce1cfeab9442654c093d75d.exe
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
9ae3403e0b79dd964868658c1ab28b32751dd2764ce1cfeab9442654c093d75d.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
9ae3403e0b79dd964868658c1ab28b32751dd2764ce1cfeab9442654c093d75d.exe
-
Size
7.7MB
-
MD5
cc249f37ea397a838c1c298d279abc74
-
SHA1
13ca2d1db4de57e808e2ad09f88cc715489b559b
-
SHA256
9ae3403e0b79dd964868658c1ab28b32751dd2764ce1cfeab9442654c093d75d
-
SHA512
8234c02f5d3f55504763e6c285f7f55b62fb120e19758d5aced19342cefa870fdc8ac547f16827e1dfeb6fde89f15f19a7d713b4848d4d588b55f67b7b56d90e
-
SSDEEP
196608:vJt3lWqtfW000RaLX2sJxZ0+anqARqHTW:jD00K2sJs+aqA0H6
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4884-2-0x00000000012B0000-0x00000000012BB000-memory.dmp upx behavioral2/memory/4884-4-0x00000000012B0000-0x00000000012BB000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4884 9ae3403e0b79dd964868658c1ab28b32751dd2764ce1cfeab9442654c093d75d.exe 4884 9ae3403e0b79dd964868658c1ab28b32751dd2764ce1cfeab9442654c093d75d.exe