Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 21:09
Behavioral task
behavioral1
Sample
7090d11f9ab4956e0d634839eb539ea7.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7090d11f9ab4956e0d634839eb539ea7.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7090d11f9ab4956e0d634839eb539ea7.exe
-
Size
254KB
-
MD5
7090d11f9ab4956e0d634839eb539ea7
-
SHA1
3fef2b72b3535e43c0f4918c57c56ad545278c79
-
SHA256
9bd9b2b8d303c1dbc509d4d07777e410f9f24ade4b9ab33b4d5a0ff7b4b64619
-
SHA512
b5c9d05681af98c36beb9c936048c9595b5f448e0fe6b1c36dab0af19b2a8bf03f098a12e017cdb19a3ec6ced0aad8a7a9397f2f2df4c6e27f41954c8f347c1a
-
SSDEEP
6144:kh20ZjUW5KksfXcchD/aXx8D8jwrWDaouzA+6wTi5bM2uFfoS:G2mFKkufBCwl9zAbwG5JsfoS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1980-0-0x0000000000400000-0x00000000006A2000-memory.dmp upx behavioral1/memory/1980-3-0x0000000000400000-0x00000000006A2000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 7090d11f9ab4956e0d634839eb539ea7.exe