Analysis
-
max time kernel
181s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:22
Behavioral task
behavioral1
Sample
37d4a46b9650502e56a37f4ed25b8819.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
37d4a46b9650502e56a37f4ed25b8819.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
37d4a46b9650502e56a37f4ed25b8819.exe
-
Size
91KB
-
MD5
37d4a46b9650502e56a37f4ed25b8819
-
SHA1
fe0cf754be791fafc378acb0ff027d4f7818103b
-
SHA256
a218f6af11025119186fe7bd91ab1282730885bb490fdd8b713f8b0d5adcfce1
-
SHA512
68ec1794e05487a7b439bb31f3b630a9c6dcf7056656668192995b365615e32ce44aa33eeeab4943aad3f89f378c9752b027aefb21c208cde379f594a1739ae7
-
SSDEEP
1536:uJ8wUqzSqxl1a7dJ8ijpX9J2ltMeXe/WShTeDSJ4dz2ibAEchLIC6ldRl7futMM3:QnUqzZi3XmtMeSWfOkzhBlCKz7mtMMMQ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4804-0-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral2/memory/4804-3-0x0000000000400000-0x0000000000461000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4804 37d4a46b9650502e56a37f4ed25b8819.exe