Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 20:34
Behavioral task
behavioral1
Sample
190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2.exe
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2.exe
-
Size
558KB
-
MD5
5ab975bb71e48bcf3c73424167adf3fb
-
SHA1
99e4d9d7fac285a225b772b57c2b5b4f91edbea3
-
SHA256
190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2
-
SHA512
592f339834b4dd4f0c38af5603e2dbafcf93e0ddd244e58a9c9d60d59a02cbafab16c751eb65e1466136791f48cd7ff99723495f7f69f1f5fad95dd759ef219c
-
SSDEEP
12288:GcQbx3pBocfwL8TpEbezdll5+k9EnChg+fmP13JjUWw0PfGBkR:Gnb1ocfRBz/TRW+63w0XJ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/368-0-0x0000000000400000-0x0000000000571000-memory.dmp upx behavioral1/memory/368-1-0x0000000000400000-0x0000000000571000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 368 190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2.exe 368 190ced6dfada8283af6e052b0bbd0b8988996ba59646ac5c1b5f7003fa174ef2.exe