Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 22:24
Behavioral task
behavioral1
Sample
ad023ba47d8b8c2ab77ca166764e6504.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad023ba47d8b8c2ab77ca166764e6504.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ad023ba47d8b8c2ab77ca166764e6504.exe
-
Size
89KB
-
MD5
ad023ba47d8b8c2ab77ca166764e6504
-
SHA1
67bb0d6fdb38d040cdeaaecd0ee69ab6f851cf27
-
SHA256
e798e4ed0e297b87aca62a1029333bbfcf28ec1ad1e7d639c475d297b9ee1f7c
-
SHA512
b64ff5806a234ba74e45f79f821a5d1363dfef8bda33acf6ab96879650296a0a567c136c1deb15d7945ba3c93e70fcbf605562d64dd5dd4c26e902da814f2b91
-
SSDEEP
1536:eaWuc/E56YaL210np0olzftOyOI+yoXp8W0cpsv8PWctPFuUxbbY0K03/BH1gHZS:Ok6Yay+fAbI+yoXheytPFuYbY0bvBVgE
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2344-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2344-3-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2344 ad023ba47d8b8c2ab77ca166764e6504.exe