Analysis
-
max time kernel
136s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 08:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9.exe
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9.exe
Resource
win10v2004-20240611-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9.exe
-
Size
9.0MB
-
MD5
ee34e42949f79b30c06c3b0cf0195b02
-
SHA1
f0f8b151b2da4f3e60cd1de3913b66c7cf4d4063
-
SHA256
801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9
-
SHA512
2e832f1fc504a6a620854d5a87f1e1ee0c1b424e0a9c137a458e8b634b77e91d143c47f9fac032e24de350a5f0aff82e199e9508efbd31320a95b445096971bf
-
SSDEEP
196608:5dtFYkPLzcde/iUusIUGo1nUcZ2wo16EfVH:v/YwLoduXtPU2ol9
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/752-1-0x0000000002550000-0x000000000255B000-memory.dmp upx behavioral2/memory/752-2-0x0000000002550000-0x000000000255B000-memory.dmp upx behavioral2/memory/752-7-0x0000000002550000-0x000000000255B000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 752 801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9.exe 752 801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9.exe 752 801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9.exe 752 801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9.exe 752 801781102ca15836ddb385f79c096da5f4bd92f2e7016fe0ea40ca49826887f9.exe