Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 19:37
Behavioral task
behavioral1
Sample
2f500923ab9982ab20f426acc13c09fd903cf1804937eb6ea252d81a9bba4ab1.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f500923ab9982ab20f426acc13c09fd903cf1804937eb6ea252d81a9bba4ab1.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2f500923ab9982ab20f426acc13c09fd903cf1804937eb6ea252d81a9bba4ab1.exe
-
Size
1.5MB
-
MD5
2088560e13fb0d8541877db2e6163fc0
-
SHA1
1003726444a5055bfe20b1c89233f51107e264ad
-
SHA256
2f500923ab9982ab20f426acc13c09fd903cf1804937eb6ea252d81a9bba4ab1
-
SHA512
3a91efb6c291aeb2d101a60af57a2a714fd9e9a678cb0eff8e487f87af038d4312e2c6bab94a7f4818b01cbd40fc135de271c470ad06f24a4460196626a273e8
-
SSDEEP
49152:6AZQ3Fq+usSlPfOwPpMRQO4eAsqWH6zRi:6Ai3kpsihPpM3fd6zRi
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2140-0-0x0000000000400000-0x0000000000ACD000-memory.dmp upx behavioral1/memory/2140-2-0x0000000000400000-0x0000000000ACD000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2140 2f500923ab9982ab20f426acc13c09fd903cf1804937eb6ea252d81a9bba4ab1.exe