Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 15:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7aa710605bb58a73b7045f08563d9f8d.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7aa710605bb58a73b7045f08563d9f8d.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
7aa710605bb58a73b7045f08563d9f8d.exe
-
Size
64KB
-
MD5
7aa710605bb58a73b7045f08563d9f8d
-
SHA1
4c6972102cb2a871b77a61fcc38d2ecaf6a0935b
-
SHA256
4be5a20f3bb39c7d3e3dec101f906841d31db9aa390343f1a28f847c73e9199b
-
SHA512
16fe30aa6842607680202e420004a6428bc95d77fdb170dad2fe9c1b4f90ba07f549289e85691afb999ce433a9c92326d94c4caa2f2d9639013edb807e41927d
-
SSDEEP
1536:duR7dX4XFXzz13h+poT2yW6UhYsVXzzbXwX:dqdolzB3h+a6jYslzfg
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Microsoft_Pop_Load.tmp 7aa710605bb58a73b7045f08563d9f8d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4968 7aa710605bb58a73b7045f08563d9f8d.exe