Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 08:15

General

  • Target

    f52eb4829aaeb21e7a3195ce836fa19ca4e35fb86a429f22c82046c3d1a84d22.exe

  • Size

    735KB

  • MD5

    2af6f251c150fdeba42dd42d169554cc

  • SHA1

    b3eebba0bf9198c071d9717399475cda5db4eb8c

  • SHA256

    f52eb4829aaeb21e7a3195ce836fa19ca4e35fb86a429f22c82046c3d1a84d22

  • SHA512

    b40acedd2b47df6ee28004bb48558b16179798a42ac7c8ee59cd1437984bf26b1d2deb7bda99397edaf309765a01f26b8b134ba8b4fe1eac9d5870646282bcbc

  • SSDEEP

    12288:xlISedbJqrFm4UGmys2fwPoR/uSsEScg3lkB75CvtNsv:xlIScwAPUsAwP6g3lkBdGQ

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f52eb4829aaeb21e7a3195ce836fa19ca4e35fb86a429f22c82046c3d1a84d22.exe
    "C:\Users\Admin\AppData\Local\Temp\f52eb4829aaeb21e7a3195ce836fa19ca4e35fb86a429f22c82046c3d1a84d22.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1752-54-0x0000000075111000-0x0000000075113000-memory.dmp

    Filesize

    8KB

  • memory/1752-55-0x0000000000400000-0x0000000000626000-memory.dmp

    Filesize

    2.1MB

  • memory/1752-57-0x0000000000400000-0x0000000000626000-memory.dmp

    Filesize

    2.1MB

  • memory/1752-56-0x0000000000400000-0x0000000000626000-memory.dmp

    Filesize

    2.1MB

  • memory/1752-58-0x0000000000400000-0x0000000000626000-memory.dmp

    Filesize

    2.1MB

  • memory/1752-59-0x0000000000400000-0x0000000000626000-memory.dmp

    Filesize

    2.1MB