Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 09:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7cd25c1aed855c27be02f6feb9d069b0.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7cd25c1aed855c27be02f6feb9d069b0.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
7cd25c1aed855c27be02f6feb9d069b0.exe
-
Size
150KB
-
MD5
7cd25c1aed855c27be02f6feb9d069b0
-
SHA1
3fd38ca17473ccdc9927a4afff740e516f692b8c
-
SHA256
ae55293e1e949775a365e635978e487e5f250d6a9209d747ff1701b57b75b01e
-
SHA512
f457ecbde236b1fcbb91ee1f66c9d6e24904ce7ceff7aa89c9d26da30eccf0928e9e441aabc3a51788140a96ddb12c028ffc6b23e080d38889dae253433cb574
-
SSDEEP
1536:HAp/aAwVqHLveJuB4HTj09sgvsvZ15u4B8R2hf8lZkl3k+i0mR10IvLva42/WJ8m:HApO0rRBSTj0ZqO49fVkSgHvu4wa8ng3
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\dllload\osql.exe 7cd25c1aed855c27be02f6feb9d069b0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 400 7cd25c1aed855c27be02f6feb9d069b0.exe