Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:36
Behavioral task
behavioral1
Sample
0a4537ed2fe549bdd60a2579b36deae6.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a4537ed2fe549bdd60a2579b36deae6.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0a4537ed2fe549bdd60a2579b36deae6.exe
-
Size
31KB
-
MD5
0a4537ed2fe549bdd60a2579b36deae6
-
SHA1
71612ce99be67ae6812a40d8260db950a146b6f7
-
SHA256
003302d265f38d8f758ce6ee414f782fa54f310304b85704ea91d6b576e9c8f3
-
SHA512
eeec14b427d2e72bda118af2326bee9be6adc6d464786fbf72fe31f415da234f2b3ab68fa94ccd8bc40f936902fd8096784be3fbc3ebd74e53c0996e7c70103e
-
SSDEEP
768:OPwoXmWzWoGOXu2CwTCQGxKv2r9+YElZeDCR12ZQ21QGse:SwDP5wTCQ50mZeDCR12ZQ212e
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2432-0-0x0000000000400000-0x000000000040F001-memory.dmp upx behavioral1/memory/2432-3-0x0000000000400000-0x000000000040F001-memory.dmp upx behavioral1/memory/2432-4-0x0000000000400000-0x000000000040F001-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2432 0a4537ed2fe549bdd60a2579b36deae6.exe