Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 13:06
Behavioral task
behavioral1
Sample
70daddc4037403a9bcba38acca6fffac.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
70daddc4037403a9bcba38acca6fffac.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
70daddc4037403a9bcba38acca6fffac.exe
-
Size
249KB
-
MD5
70daddc4037403a9bcba38acca6fffac
-
SHA1
e10159d768e0e977457edb9a623f9b503cc5dc5a
-
SHA256
0a946a0dd7560e9fc39332c4b15d9623dd4f5cb9337c083c1f8d4a3412e0dddd
-
SHA512
a6acd3d7ad8ef53e42352eb7742159d71992b5e7c1849b2da3662ebb7c361e450b4348fd1ea00b14d8780ba8117198e2f53e1d97bacce920d875e9c8b04cc408
-
SSDEEP
6144:nv+lJs7r/cgW/WKgYHVQj4GUG6bSceVe1ihFjv+st5eezl0Dm4kZ/4J6G4dJlQfF:mlq7r/cgW/WKg60QGA
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4212-0-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4212-3-0x0000000000400000-0x0000000000440000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4212 70daddc4037403a9bcba38acca6fffac.exe