Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:22
Behavioral task
behavioral1
Sample
b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exe
Resource
win7-20240215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exe
-
Size
3.5MB
-
MD5
939261459f9c29343dd1d6bd51f3709e
-
SHA1
b1110b91465ebc137402a3c30842b0e87e870365
-
SHA256
b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028
-
SHA512
697e447e742854cc4a9111b6451f2eed31d8d87b5db595ac6958ddd4f93110d1ad5e154c01a8b64db1cd7e26dcfffd637e183315a6aeeb7899ebc76c64f321db
-
SSDEEP
98304:yrhykOZOI5gDEmc6Bmc3NshwCZwPSfl7R3e1T:yrhsUvEckwCZxltO1
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2936-0-0x000000013F990000-0x0000000140BCF000-memory.dmp upx behavioral1/memory/2936-1-0x000000013F990000-0x0000000140BCF000-memory.dmp upx behavioral1/memory/2936-4-0x000000013F990000-0x0000000140BCF000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exepid process 2936 b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exe 2936 b5732ac85589fdbe360af0d41fe4b409796fe414999c785bcf11f9b092ecf028.exe