Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:06

General

  • Target

    f20277de0582abb21c522c230f682753eeef34a26af847ced8ce00cc20632f31.exe

  • Size

    278KB

  • MD5

    742c4bedcad362e39748af341128892c

  • SHA1

    da22364964abef4e9f745e5bb5c7253e4509c4c0

  • SHA256

    f20277de0582abb21c522c230f682753eeef34a26af847ced8ce00cc20632f31

  • SHA512

    5eb507969919d133277df858c4e0b7b0b9d47aa966b66cb7759edbeaf49c3fdc459c132c2464942993f0889b3be6b6c3b6e27e59d26619c2ae1213dfbad59bf0

  • SSDEEP

    6144:n7sW/AIBMrmB9rDBKtadtVgRbaW2B3pSlSXtlX:7dAIBvHrDBKodtVgRbaWAPdt

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f20277de0582abb21c522c230f682753eeef34a26af847ced8ce00cc20632f31.exe
    "C:\Users\Admin\AppData\Local\Temp\f20277de0582abb21c522c230f682753eeef34a26af847ced8ce00cc20632f31.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4216-132-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4216-134-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-133-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-136-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-135-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-137-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-138-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-140-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-139-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-141-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4216-144-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4216-145-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB