Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:53
Behavioral task
behavioral1
Sample
0f280ba4f44a6fa0f83c238d1efa98ff.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f280ba4f44a6fa0f83c238d1efa98ff.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0f280ba4f44a6fa0f83c238d1efa98ff.exe
-
Size
224KB
-
MD5
0f280ba4f44a6fa0f83c238d1efa98ff
-
SHA1
62731356022a36875f0e2011a29e85ae98b026df
-
SHA256
9addcad6ee840c483aa74959773a6b13dcd02ee6ff7073055df71d4e654891a6
-
SHA512
fb31be50fcac6aae719d8e292d3287ef05b7a287f812eefd24a6d0d2942a186676b954e0b10fb1e1399b28a687c6c82a0062c12007428436289e45589d3f29e7
-
SSDEEP
6144:XwilmkMawmWPU+5UVKkw7J7HD6BhCXOrWeZj:twLbUg57Nj6PwKWeZ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2436-0-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2436-2-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2436 0f280ba4f44a6fa0f83c238d1efa98ff.exe 2436 0f280ba4f44a6fa0f83c238d1efa98ff.exe