Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 01:18
Behavioral task
behavioral1
Sample
5518560212f95125b4240cc6edb2b068.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5518560212f95125b4240cc6edb2b068.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
5518560212f95125b4240cc6edb2b068.exe
-
Size
25KB
-
MD5
5518560212f95125b4240cc6edb2b068
-
SHA1
c5cfb7d2c1ee62bb4778d4ee5ce019cb3ab01560
-
SHA256
17cf0ad6026fc8d2b6d3b3f6a2fb7eb06083981ebb16c365f685096190a214e2
-
SHA512
da69143102002847590ae4ba987af4ca09a8d909bb7662eddc9ca8c85735539851b6f9d1bcdcaeb6b7d3779efdeec54c34ae9f8e340d2d6de9b06db63cfa396e
-
SSDEEP
384:NL4u+tvFFBEJyk/4BTsLH88Kuf/pUFYPdjiVhZS1yy5XXf0uCW7UzTNj:N4td4JFXKu3mF0iKXXsuCWAP
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1948-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1948-3-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1948-4-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 5518560212f95125b4240cc6edb2b068.exe