Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 23:07

General

  • Target

    2f3c1c58812e47633e9bd3d35df834cfcdfc8ae143218767aa4a17910af36172.exe

  • Size

    176KB

  • MD5

    69149d4fbc2666bd9beb761b3337e6fe

  • SHA1

    f27c17a5e9b3d77a6049637b54ff9d56c4b91785

  • SHA256

    2f3c1c58812e47633e9bd3d35df834cfcdfc8ae143218767aa4a17910af36172

  • SHA512

    833db5449a8f6333ff13127334e19fc105a6a473552f395d39101ab19e7e0c094f514459294f41b1ee4c7388ad120b31484ebbeeefa8bb6ebe13fc488a814e72

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f3c1c58812e47633e9bd3d35df834cfcdfc8ae143218767aa4a17910af36172.exe
    "C:\Users\Admin\AppData\Local\Temp\2f3c1c58812e47633e9bd3d35df834cfcdfc8ae143218767aa4a17910af36172.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-56-0x00000000769D1000-0x00000000769D3000-memory.dmp
    Filesize

    8KB

  • memory/1644-57-0x0000000001ED1000-0x0000000001ED6000-memory.dmp
    Filesize

    20KB

  • memory/1644-58-0x0000000000340000-0x000000000034A000-memory.dmp
    Filesize

    40KB

  • memory/1644-59-0x0000000000340000-0x000000000034A000-memory.dmp
    Filesize

    40KB

  • memory/1644-60-0x0000000000340000-0x000000000034A000-memory.dmp
    Filesize

    40KB

  • memory/1644-61-0x0000000000340000-0x000000000034A000-memory.dmp
    Filesize

    40KB