Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 12:59
Behavioral task
behavioral1
Sample
36b8ffc6c48d371e942eb8bddc9c241b0a2f9e3227107c24202c88cf78cfc2b3.exe
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
36b8ffc6c48d371e942eb8bddc9c241b0a2f9e3227107c24202c88cf78cfc2b3.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
36b8ffc6c48d371e942eb8bddc9c241b0a2f9e3227107c24202c88cf78cfc2b3.exe
-
Size
374KB
-
MD5
81d89fc3780add3ef4a6b85c5bec439c
-
SHA1
12469533df5419b9ee2ca875e92d38f75e53002b
-
SHA256
36b8ffc6c48d371e942eb8bddc9c241b0a2f9e3227107c24202c88cf78cfc2b3
-
SHA512
1818eb35184830f3822b11b5a16a7641302996fb3cac8173b67c4cd6e507ade6564b4800771cba3ac9a1fbfa2564470606919d67ed81c7194089ad239dae5112
-
SSDEEP
6144:tdiIVJXjHi8zLMQ4bpOKA7R9UzV3M8yj5/UyiEmmDvQxAGkLaR/0a:tdiGXu8zLAbpK3GdJyjOybYxAG8r
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-1-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-2-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-3-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-4-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-5-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-6-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-7-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-8-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-9-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-10-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-11-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-12-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-13-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-14-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2232-15-0x0000000000400000-0x00000000004FE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2232 36b8ffc6c48d371e942eb8bddc9c241b0a2f9e3227107c24202c88cf78cfc2b3.exe 2232 36b8ffc6c48d371e942eb8bddc9c241b0a2f9e3227107c24202c88cf78cfc2b3.exe