Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 11:46
Behavioral task
behavioral1
Sample
065bb2182303f497e0adbb4409cc0680658a49fdbaf4bc09ea8bae96be17842b.exe
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
065bb2182303f497e0adbb4409cc0680658a49fdbaf4bc09ea8bae96be17842b.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
065bb2182303f497e0adbb4409cc0680658a49fdbaf4bc09ea8bae96be17842b.exe
-
Size
194KB
-
MD5
da81b3e20a387c5298c63e40fd0dbf70
-
SHA1
67830ef9b1884b46e83a5240371805c122f84652
-
SHA256
065bb2182303f497e0adbb4409cc0680658a49fdbaf4bc09ea8bae96be17842b
-
SHA512
11085a03bb5a19cb8cbb4d0590ca43a8ba705295008cd9c82bab9e4c4a352b763c31318f3f71b4a909095f25c1aa471e720beddd758c17246af59daeac192a84
-
SSDEEP
3072:UpmMsjo30cShq4ntehsmjtuPKDAh6DhhuBVasimMvuiIEPbTt1HXuNs:7oEb0BTcCkh6DqBVlimMWNEPbJ1H+
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/752-0-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral1/memory/752-3-0x0000000000400000-0x0000000000496000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 752 065bb2182303f497e0adbb4409cc0680658a49fdbaf4bc09ea8bae96be17842b.exe