Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
18/11/2023, 14:57
Behavioral task
behavioral1
Sample
cd0c37f5898f996787492a25d731c0be6028f1e3a7e43806d6c214f38e4297b9.exe
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
cd0c37f5898f996787492a25d731c0be6028f1e3a7e43806d6c214f38e4297b9.exe
Resource
win10v2004-20231020-en
2 signatures
150 seconds
General
-
Target
cd0c37f5898f996787492a25d731c0be6028f1e3a7e43806d6c214f38e4297b9.exe
-
Size
560KB
-
MD5
06ccb032ed27c8553aa731358c023ae3
-
SHA1
06459b3b5c6e7dbf3c0b0e4cdaf719c91a49a08b
-
SHA256
cd0c37f5898f996787492a25d731c0be6028f1e3a7e43806d6c214f38e4297b9
-
SHA512
2cbab2dd058d68ad0549065716224c8006db3bb6bfd45308e106e0b2d9d417e5bcdac40942822b6abe590eecf6972c58e30a5e90f88f1a08e18fc9f98020631d
-
SSDEEP
12288:uibniQbSTKfAMp/yrpviunoOAwS8fUggenjqGxTOLdTDNWWoSok:uEBOKIdxiuFs8fUgD5KZu
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1700-0-0x0000000000400000-0x00000000005C1000-memory.dmp upx behavioral1/memory/1700-1-0x0000000000400000-0x00000000005C1000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1700 cd0c37f5898f996787492a25d731c0be6028f1e3a7e43806d6c214f38e4297b9.exe 1700 cd0c37f5898f996787492a25d731c0be6028f1e3a7e43806d6c214f38e4297b9.exe