Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 00:03
Behavioral task
behavioral1
Sample
4fed314dbfca35b44e66c5bed6dc9d4b0a486723c4411e0d83040cd1e1d5af5f.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4fed314dbfca35b44e66c5bed6dc9d4b0a486723c4411e0d83040cd1e1d5af5f.exe
Resource
win10v2004-20231020-en
General
-
Target
4fed314dbfca35b44e66c5bed6dc9d4b0a486723c4411e0d83040cd1e1d5af5f.exe
-
Size
1.5MB
-
MD5
127780f8774657fa069dbc140b8f1ea3
-
SHA1
1b02dc36e3c6f5b472c02fdd9c47deb59bf9e028
-
SHA256
4fed314dbfca35b44e66c5bed6dc9d4b0a486723c4411e0d83040cd1e1d5af5f
-
SHA512
881137ef41bd30159da2ec98c557d516800c049d982ce315f6b642db32fae96bbf419d46f7fcca5b0d2b1d546304762aa07150609e12a1a52428233ea1669d02
-
SSDEEP
24576:lPPPJVpUoOMqyBvzyaxB94rspfXucywFmKSHtXub+WnJ1zDhU4OPmfpWz6RRct:ppVOfELh945mrSHtXuVb3e4OPEp5RRc
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2448-0-0x0000000000400000-0x0000000000803000-memory.dmp upx behavioral2/memory/2448-1-0x0000000000400000-0x0000000000803000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2448 4fed314dbfca35b44e66c5bed6dc9d4b0a486723c4411e0d83040cd1e1d5af5f.exe