Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 22:49
Behavioral task
behavioral1
Sample
7898aae2ea8f1e3c0bbd9074d1454f71.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7898aae2ea8f1e3c0bbd9074d1454f71.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7898aae2ea8f1e3c0bbd9074d1454f71.exe
-
Size
655KB
-
MD5
7898aae2ea8f1e3c0bbd9074d1454f71
-
SHA1
9a8eb69a04206f07c3cb118700e5e67dc5d5cd50
-
SHA256
133ca00af9478427a0e1137930fa24b05dfa4c6ccf3729ad7fef22ad10413d77
-
SHA512
852706bdc02986e5fba171e309b9dcc95688396decd15d520734e178c59f3ef88a3eb2d3cc23f5f23f77d79cb20c1fe2a4e375ea0e5bca0359707f5e6eb635ff
-
SSDEEP
12288:PHiPuXjJ0Vykv2gIHk/ZPBcoxV3H4KP6cLzGiHlcvsZ+u8Sm0eSBtDjUlTK:/H+Fv2gIHuH5PJLaiFcvsZ+jS2K
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4968-0-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-3-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-4-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-5-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-6-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-7-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-8-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-9-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-10-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-11-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-12-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-13-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-14-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-15-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-16-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-17-0x0000000000400000-0x00000000005D8000-memory.dmp upx behavioral2/memory/4968-18-0x0000000000400000-0x00000000005D8000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4968 7898aae2ea8f1e3c0bbd9074d1454f71.exe 4968 7898aae2ea8f1e3c0bbd9074d1454f71.exe 4968 7898aae2ea8f1e3c0bbd9074d1454f71.exe