Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08-10-2023 12:16
Behavioral task
behavioral1
Sample
1c97efb05cf5e002a6321241c41426a7224766d0578c56cec6100da30685b41d.exe
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1c97efb05cf5e002a6321241c41426a7224766d0578c56cec6100da30685b41d.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1c97efb05cf5e002a6321241c41426a7224766d0578c56cec6100da30685b41d.exe
-
Size
15.2MB
-
MD5
e9ddedd9d04dffed9b64b9288ef85791
-
SHA1
f1a5f253e2645aabc32395631801fd6cc1532534
-
SHA256
1c97efb05cf5e002a6321241c41426a7224766d0578c56cec6100da30685b41d
-
SHA512
891803232b9ef5ec5a4990ea8d8e9cdda77f2b5febb4b7e89425535cd795ee6e2ab913a31ccde94fd67fd09accd4701677fc3db597a8747d05d0a886dbbbcdab
-
SSDEEP
98304:0GzgrBKf843r5kRMrYNxWaf4ukr82etmNc6JEztAXMbQMgbOU:+cf84b576xWaf4ukr8LtmNc6Jz7Hl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1096-0-0x0000000000400000-0x00000000005F5000-memory.dmp upx behavioral1/memory/1096-2-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral1/memory/1096-5-0x0000000000400000-0x00000000005F5000-memory.dmp upx behavioral1/memory/1096-6-0x0000000010000000-0x0000000010018000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1096 1c97efb05cf5e002a6321241c41426a7224766d0578c56cec6100da30685b41d.exe 1096 1c97efb05cf5e002a6321241c41426a7224766d0578c56cec6100da30685b41d.exe 1096 1c97efb05cf5e002a6321241c41426a7224766d0578c56cec6100da30685b41d.exe