Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 09:44
Behavioral task
behavioral1
Sample
eebc094755eeec71effb26d6f40df34a192bbbeeaae390484e6472ea2678b807.exe
Resource
win7-20231023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
eebc094755eeec71effb26d6f40df34a192bbbeeaae390484e6472ea2678b807.exe
Resource
win10v2004-20231025-en
2 signatures
150 seconds
General
-
Target
eebc094755eeec71effb26d6f40df34a192bbbeeaae390484e6472ea2678b807.exe
-
Size
562KB
-
MD5
61fbcf3f9a327ced7dabcef2d1d9e88f
-
SHA1
4babf6c8006765ea1e6e31e86b58e5f4d18ed99c
-
SHA256
eebc094755eeec71effb26d6f40df34a192bbbeeaae390484e6472ea2678b807
-
SHA512
8e20cc7d19a30a8dd368d407c512e83d09272195e392d6f57d1d6f44c30f7f88d2c0c68df3094dc4079f2fbfefc17d6d0114c185ca39ffd4fbc6db4949d21ea3
-
SSDEEP
12288:NZohgWh96nde+Nk1tpe5R1QO7xQYw0uFUEaa:4/+Nk1tp48O1lu3R
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/952-0-0x0000000000400000-0x0000000000559000-memory.dmp upx behavioral2/memory/952-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-22-0x0000000000400000-0x0000000000559000-memory.dmp upx behavioral2/memory/952-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/952-49-0x0000000000400000-0x0000000000559000-memory.dmp upx behavioral2/memory/952-55-0x0000000000400000-0x0000000000559000-memory.dmp upx behavioral2/memory/952-61-0x0000000000400000-0x0000000000559000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 952 eebc094755eeec71effb26d6f40df34a192bbbeeaae390484e6472ea2678b807.exe 952 eebc094755eeec71effb26d6f40df34a192bbbeeaae390484e6472ea2678b807.exe 952 eebc094755eeec71effb26d6f40df34a192bbbeeaae390484e6472ea2678b807.exe