Resubmissions

12-11-2021 18:04

211112-wnzb8aahhm 10

19-11-2020 10:08

201119-rhwlt38jrx 10

18-11-2020 17:26

201118-htd4fq29va 10

Analysis

  • max time kernel
    122s
  • max time network
    304s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    12-11-2021 18:04

General

  • Target

    api.exe

  • Size

    22.9MB

  • MD5

    3561a1c35184a0b60b89f4b560a9660d

  • SHA1

    e39442388db90a088a8eb8ce46d4f61182334a1b

  • SHA256

    3f1e28e961239c01602b1ce7555f51778c9f369b059ef07b75a7d9dee70ff8b1

  • SHA512

    7a83a669e8a72d6ec83952c9d57cc8059a6fff6f3564dab69ad50ca939a7d8e3f3d7d9ed74f8d06d060a39f8c4525fcfdcdecf2550c6fe57da0bef3df1f5ee75

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\api.exe
    "C:\Users\Admin\AppData\Local\Temp\api.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads