Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 14:19
Behavioral task
behavioral1
Sample
21b6a4da378edd5ff80c7e19a4fbd8348cddeb73e4436475fc7f6628c1ea2564.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
21b6a4da378edd5ff80c7e19a4fbd8348cddeb73e4436475fc7f6628c1ea2564.exe
Resource
win10v2004-20230915-en
General
-
Target
21b6a4da378edd5ff80c7e19a4fbd8348cddeb73e4436475fc7f6628c1ea2564.exe
-
Size
559KB
-
MD5
55eb0d8fdab64edfe56608cf3cc7122e
-
SHA1
687753533ccac0502a192762617cb42c3f7b7e27
-
SHA256
21b6a4da378edd5ff80c7e19a4fbd8348cddeb73e4436475fc7f6628c1ea2564
-
SHA512
ce0a468a03831fac349258f63994b7c4c3ae148391a9ff84030bc7b33a698139a1e75dc8d269210abbf738ef82f96bdcf626777713ddff0450a47c9862e991d7
-
SSDEEP
12288:GovYrLsCOwz0rrOSzbTjArWoSLlzrelZLOJaWSr2I68RBI77n4aJUuLisfubM:GovYrQtwzcOwvzrelZLOBSaI68Ry7MaW
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2560-0-0x0000000000400000-0x0000000000574000-memory.dmp upx behavioral1/memory/2560-1-0x0000000000400000-0x0000000000574000-memory.dmp upx behavioral1/memory/2560-4-0x0000000000400000-0x0000000000574000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2560 21b6a4da378edd5ff80c7e19a4fbd8348cddeb73e4436475fc7f6628c1ea2564.exe 2560 21b6a4da378edd5ff80c7e19a4fbd8348cddeb73e4436475fc7f6628c1ea2564.exe