Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 21:18
Behavioral task
behavioral1
Sample
3d1d71761ec292465cef6d748d556d3c.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d1d71761ec292465cef6d748d556d3c.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
3d1d71761ec292465cef6d748d556d3c.exe
-
Size
14KB
-
MD5
3d1d71761ec292465cef6d748d556d3c
-
SHA1
62aaf8fdffd97bd2e3ef0f32ba86c14a0af2da24
-
SHA256
e5a19b61097d364e907014c3a9f61cfb44f263955abc7ef91374e661bf78525a
-
SHA512
b7c9bbf45cfa77816ed8b79ce8a4ccb12a56284160a5791729dfe984ed2b047406cd7705e5830af66f70e3d876fd296e1fac9d3c90b93604c06a270d6f90ce79
-
SSDEEP
192:MoieLsPBOWEbSi0X70pogAhSO6+bNOMiQh5Ze22scgYCBFq5pvYg2:MojsZnl4GgAUO6MBa/Og2
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1172-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/1172-3-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1172 3d1d71761ec292465cef6d748d556d3c.exe