Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:50
Behavioral task
behavioral1
Sample
7522be05eab987f908999ab6a154bd20.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
General
-
Target
7522be05eab987f908999ab6a154bd20.exe
-
Size
458KB
-
MD5
7522be05eab987f908999ab6a154bd20
-
SHA1
2ed1862eb04e9ebaba62c9bf951cbb52537bec9e
-
SHA256
e0f6e696c89cda382894cabb633b4b44b424788509350332a6e4ba4577bcee5c
-
SHA512
ebcb85407ba11ff3e869a43c62b850e28b37633639bc6fded85e354a6742a109ea69c42ba293e589ce66213d5c6e5ae841eb4a972eb51c12ee9c78081fde16c7
-
SSDEEP
12288:6KV22DSJNghjIkH8S3eVdskjLX9BDObhfuV4IAuP99hm:j22DSTgJ30dsI9qfuCIljhm
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/5016-0-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral2/memory/5016-1-0x0000000000400000-0x000000000053A000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
7522be05eab987f908999ab6a154bd20.exepid process 5016 7522be05eab987f908999ab6a154bd20.exe