Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:51
Behavioral task
behavioral1
Sample
1c1cdf8a7d034eb23ec6f86bf567576d.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1c1cdf8a7d034eb23ec6f86bf567576d.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
1c1cdf8a7d034eb23ec6f86bf567576d.exe
-
Size
497KB
-
MD5
1c1cdf8a7d034eb23ec6f86bf567576d
-
SHA1
7c9907d2cd01a242710681972cc0a934f535c92c
-
SHA256
c267ae9fc1fc7fd0819a6e7c3ad12b4d6022e922895faae98f9b4999a9e8e7b1
-
SHA512
d288a2781da01037f639ceba6b88080058041ecf237767a1abeb82989d6d5d617349239130243b5848de5b8adba256f8bc62e41626b2339c77a47359db4c65b1
-
SSDEEP
12288:qyHz8+J1E8qIAQDeVrCF8F5PzB+RUqCqIrKTGq:q+QaK8ZiVW8JzB+zI
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4464-0-0x0000000000400000-0x00000000005B3000-memory.dmp upx behavioral2/memory/4464-1-0x0000000000400000-0x00000000005B3000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4464 1c1cdf8a7d034eb23ec6f86bf567576d.exe 4464 1c1cdf8a7d034eb23ec6f86bf567576d.exe 4464 1c1cdf8a7d034eb23ec6f86bf567576d.exe