Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 09:29
Behavioral task
behavioral1
Sample
a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe
-
Size
1.0MB
-
MD5
02a151ef9c65dab95daffcd645e50ffa
-
SHA1
6d2923fbf95767d8a16bdef0beb08c67479a2222
-
SHA256
a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838
-
SHA512
483329f1352bee011da7ab6abbd05f8a435e41c07215f5684fd8865be3d526bcd26cb4e99f182d886f72435a1b0165e082f5087a38c21d25b64c520121d9d12e
-
SSDEEP
24576:O2euxE2tPnkR9lKhBuFwXIRqM9iR4Xo0ao8hENREQ9OL:wyEQPnkRnCBFXI0AiGo0SENREl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1960-0-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral1/memory/1960-3-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral1/memory/1960-7-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral1/memory/1960-9-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral1/memory/1960-10-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral1/memory/1960-15-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral1/memory/1960-16-0x0000000000400000-0x00000000006E0000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe 1960 a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe