Analysis
-
max time kernel
0s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 00:39
Behavioral task
behavioral1
Sample
470530f2e636c7b5bcc0813ce0dbb016.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
470530f2e636c7b5bcc0813ce0dbb016.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
470530f2e636c7b5bcc0813ce0dbb016.exe
-
Size
876KB
-
MD5
470530f2e636c7b5bcc0813ce0dbb016
-
SHA1
c157ff23d4ace1e0af0aba688928d2aaa4d581e6
-
SHA256
71beab2a2d7c4763a6507fcdfa52a6b5029500609c1f33fd99cbdb4517577e4f
-
SHA512
b91ca8ec97e227e65bb2dc6443f07eb2d236c6cd43413169e75e2e48424d783f9591ac732ba2a6c3a034142f6ec0de9449080a75494a913bdf4e1706221963b1
-
SSDEEP
24576:fDCc585RZCyojmJQiKia1HaL1F17e9Oj:fD3585RcjJjpsn1C9O
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4372-0-0x0000000000400000-0x00000000006AD000-memory.dmp upx behavioral2/memory/4372-9-0x0000000000400000-0x00000000006AD000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4372 470530f2e636c7b5bcc0813ce0dbb016.exe 4372 470530f2e636c7b5bcc0813ce0dbb016.exe 4372 470530f2e636c7b5bcc0813ce0dbb016.exe 4372 470530f2e636c7b5bcc0813ce0dbb016.exe