Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 10:56
Behavioral task
behavioral1
Sample
6908920c10d17db9ce5f97144abbf805.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6908920c10d17db9ce5f97144abbf805.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
6908920c10d17db9ce5f97144abbf805.exe
-
Size
70KB
-
MD5
6908920c10d17db9ce5f97144abbf805
-
SHA1
b32b283386c4c8a25427ac77970d4dcab0a5037f
-
SHA256
a33358e56a45ca94cca66d564c8d0ba34ccc1af74e75398b229521a6f78f2c32
-
SHA512
cde57c5dfdc6680bca5d93c7e33e450a563f99dea18f679eabf9a95a85c6c6e9b25e11acdf4ecc5d39c4868e12beae0d23a622dae99156921a9742842bb13a1b
-
SSDEEP
1536:4bCNkw+BNms76V0PV1oiHDwtBObIOsekr//I56VT:4bEUNmsmV0jwtcbIOsekr66x
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4624-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4624-3-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4624 6908920c10d17db9ce5f97144abbf805.exe