Analysis
-
max time kernel
206s -
max time network
417s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 22:58
Behavioral task
behavioral1
Sample
41af120135350426df6d42b1a050a5f6.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
41af120135350426df6d42b1a050a5f6.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
41af120135350426df6d42b1a050a5f6.exe
-
Size
312KB
-
MD5
41af120135350426df6d42b1a050a5f6
-
SHA1
8bbb0ec46f41adc30347495e682e1aa0560a0aba
-
SHA256
ddb04494045c5a0fd5a5a8b50e5c8a2bc71408c3fefb5cc8dfc82ab47daa705b
-
SHA512
727dcbfa56f2c36163914f130c2b41ff8929d0417445ed9cf113a01e2ca15fb2085d90bc4e0a14764757cdc8a5909a6f958c5220649102ea960e31b23aa8b109
-
SSDEEP
6144:3nlEoWaZknVIaVaHl/c+gLzTwWlAdG+GhOYxfdUv2oSKlmM:3lEoWlnVIYIlTQzlCqi2oSKcM
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1824-0-0x0000000000400000-0x00000000004E1000-memory.dmp upx behavioral2/memory/1824-1-0x0000000000400000-0x00000000004E1000-memory.dmp upx behavioral2/memory/1824-2-0x0000000000400000-0x00000000004E1000-memory.dmp upx behavioral2/memory/1824-3-0x0000000000400000-0x00000000004E1000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1824 41af120135350426df6d42b1a050a5f6.exe 1824 41af120135350426df6d42b1a050a5f6.exe