Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume1/Hussain data/NOVELS/THOUGHT/goal setting/Nice To Read/love and friendship/AstroSigns.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume1/Hussain data/NOVELS/THOUGHT/goal setting/Nice To Read/love and friendship/AstroSigns.exe
Resource
win10v2004-20240426-en
General
-
Target
Device/HarddiskVolume1/Hussain data/NOVELS/THOUGHT/goal setting/Nice To Read/love and friendship/AstroSigns.exe
-
Size
260KB
-
MD5
66198c9e54060fbe333994389200859d
-
SHA1
76af6e9ab5f54327fc62c0cc010716b3e6086831
-
SHA256
a00e417aec0bc6a2b32620126e63e70fd74e57e90d220590b0b7a5807844be03
-
SHA512
b53082e4db2341f4daa036eef4dcab4f03ec6688bd6a1a0be2ce275c940443f2e7d3d1538f07d0b3f052275a652e19c1094b0b8856717bcd259f870b18c8dd53
-
SSDEEP
3072:iz5sIiQ54w9huyNU46Ejib9ukuT0W9tt73qKUI:iz52cGYt73D
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2008 AstroSigns.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume1\Hussain data\NOVELS\THOUGHT\goal setting\Nice To Read\love and friendship\AstroSigns.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume1\Hussain data\NOVELS\THOUGHT\goal setting\Nice To Read\love and friendship\AstroSigns.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2008