Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2023, 09:29
Behavioral task
behavioral1
Sample
a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe
-
Size
1.0MB
-
MD5
02a151ef9c65dab95daffcd645e50ffa
-
SHA1
6d2923fbf95767d8a16bdef0beb08c67479a2222
-
SHA256
a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838
-
SHA512
483329f1352bee011da7ab6abbd05f8a435e41c07215f5684fd8865be3d526bcd26cb4e99f182d886f72435a1b0165e082f5087a38c21d25b64c520121d9d12e
-
SSDEEP
24576:O2euxE2tPnkR9lKhBuFwXIRqM9iR4Xo0ao8hENREQ9OL:wyEQPnkRnCBFXI0AiGo0SENREl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4280-0-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral2/memory/4280-3-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral2/memory/4280-8-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral2/memory/4280-9-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral2/memory/4280-14-0x0000000000400000-0x00000000006E0000-memory.dmp upx behavioral2/memory/4280-15-0x0000000000400000-0x00000000006E0000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4280 a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe 4280 a0ab563b2659462fd4c6c40916ec280307c6796e7c9fc9170fa3b198ff12b838.exe