Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 10:34
Behavioral task
behavioral1
Sample
a9b940ffc4f17d98e450bbbb821782ea.exe
Resource
win7-20231023-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a9b940ffc4f17d98e450bbbb821782ea.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
a9b940ffc4f17d98e450bbbb821782ea.exe
-
Size
525KB
-
MD5
a9b940ffc4f17d98e450bbbb821782ea
-
SHA1
87c70b8a300f84265178c164914e04e6076d6ab1
-
SHA256
fbc7cfe8a0e5524cda68dc93c9ff0003bdfa0ca55207504e6493d4657a925d02
-
SHA512
52b04a2fb6f294f8462d92dde7b532f27465654260842893b4ec4d498c2f12bc584f05ba1a7f0fcb5bafabebbe65e024efd270be7dc6cbcfe12c547e60a6cf53
-
SSDEEP
12288:4NrhTLpMP+R+QDCfA832AtBYmz6af0F7Z1QVj7jL:4thTiP+ffCfB5Lf0F7Z1E7jL
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1964-0-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral1/memory/1964-1-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 a9b940ffc4f17d98e450bbbb821782ea.exe