Analysis
-
max time kernel
117s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 15:06
Behavioral task
behavioral1
Sample
802411e547b562f30c8afbf7fc52e856.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
802411e547b562f30c8afbf7fc52e856.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
802411e547b562f30c8afbf7fc52e856.exe
-
Size
18KB
-
MD5
802411e547b562f30c8afbf7fc52e856
-
SHA1
09e104337b2af412740dda535fbcb9a6bd641a70
-
SHA256
8874c64a86dadd9fd7e5059ba3ee40ad6dbe252ec8f1271aefb11e81264c3efe
-
SHA512
5cd0b443d266dd0403d208f580fe60fb83f6c850439e9a5802b3fe41c12ba75d48b3648d8cd58a03b718092b01bf368d52050e5ef04abfa782ee9fbe546b83ef
-
SSDEEP
192:TfRt5Z7HQauaMKc3chYju/Qmyx+wNwv2u7Effij6eG0JQU8WAmLMR/rx:ThZ7HjYL5gQ/+sg/7EffqZG9/x
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/724-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/724-3-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 724 802411e547b562f30c8afbf7fc52e856.exe