Analysis
-
max time kernel
152s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 05:01
Behavioral task
behavioral1
Sample
d67191b816c87374b3a4206a74bb0e044e93a45a3214b1f9a2a8e288e5d673e4.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d67191b816c87374b3a4206a74bb0e044e93a45a3214b1f9a2a8e288e5d673e4.exe
Resource
win10v2004-20230915-en
3 signatures
150 seconds
General
-
Target
d67191b816c87374b3a4206a74bb0e044e93a45a3214b1f9a2a8e288e5d673e4.exe
-
Size
620KB
-
MD5
30c874212c9492722c547960cb8679c5
-
SHA1
ee7688aa4db3d8055d28139d47e01696c360eabd
-
SHA256
d67191b816c87374b3a4206a74bb0e044e93a45a3214b1f9a2a8e288e5d673e4
-
SHA512
0767cf514dd4bf34cb2fe9c3354b21955ea8f99f80e8e85721657edd0c0540cd34b0335e7424f3597e534daf01384697b45814c37ef5f71426dea272931905a6
-
SSDEEP
12288:XZv1phBwLuZy4r3w11pwUXf32lxq7qzhN9uKFO9HFg+6/28LDjU:XZ9phQ4r3AwUtqz/7FOLy/r
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3452-0-0x0000000000400000-0x00000000005B4000-memory.dmp upx behavioral2/memory/3452-3-0x0000000000400000-0x00000000005B4000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\1.bin d67191b816c87374b3a4206a74bb0e044e93a45a3214b1f9a2a8e288e5d673e4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3452 d67191b816c87374b3a4206a74bb0e044e93a45a3214b1f9a2a8e288e5d673e4.exe