Analysis
-
max time kernel
146s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 07:10
Behavioral task
behavioral1
Sample
584cc3a0ed4067058c8852931a526503.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
584cc3a0ed4067058c8852931a526503.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
584cc3a0ed4067058c8852931a526503.exe
-
Size
406KB
-
MD5
584cc3a0ed4067058c8852931a526503
-
SHA1
10b43841cf19144910efa514269f8be3e3f5efea
-
SHA256
cf36055aa7cbe58b8004db7ed7a4a2414a0c39e6ea4b91aa08cb1e8df863c7e8
-
SHA512
655b6f95d894bc4d54e7971b3addba62e675b3e76700a4ccd4551e253015b434e749e8a30c159744b200a2a9e29380f7fe04a6ef8bf11f315b7caa506f03eb6c
-
SSDEEP
12288:3W6qGSANe0xU9bwgLu3YCd9YIA4HIb4ltaQ6JbBF:fP5ybwgLu3xdmRjYoQ6dn
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5396-0-0x0000000000400000-0x000000000051B000-memory.dmp upx behavioral2/memory/5396-1-0x0000000000400000-0x000000000051B000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5396 584cc3a0ed4067058c8852931a526503.exe 5396 584cc3a0ed4067058c8852931a526503.exe