Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:00
Behavioral task
behavioral1
Sample
20e4e5c57709f1a75ecc9f6ece6c0336.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
20e4e5c57709f1a75ecc9f6ece6c0336.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
20e4e5c57709f1a75ecc9f6ece6c0336.exe
-
Size
186KB
-
MD5
20e4e5c57709f1a75ecc9f6ece6c0336
-
SHA1
9edb4dc1b47a86725d11d8f88d682001d2760352
-
SHA256
8899eac52e52c7077761bf5f883156ad2c53d534f88aff5bb76b0ba9c5ceaaaa
-
SHA512
48dc8aceaa2a1758a04a82f603734bbf7ff15123f3844e43e049f62c8484587e2e84d8b7e0cff0ff4b9f2730289a3deb24ff68134847884e8d5544b41321b22e
-
SSDEEP
3072:YfapcADNesdU6o50TLP0ArjXLA7eaLi3YvQOZUKfzKzj25iX3Q+v9xP:YSp3D1dU6RL8AnXBaLi3YIqUyzyYiHfD
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4592-0-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/4592-1-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4592 20e4e5c57709f1a75ecc9f6ece6c0336.exe