Analysis

  • max time kernel
    155s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:44

General

  • Target

    f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19.exe

  • Size

    88KB

  • MD5

    6db66372a6e75d625d0a39ee62311642

  • SHA1

    80de56254107024863e9a19618b79ac2fcf4f8f6

  • SHA256

    f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19

  • SHA512

    d012a6da9d72442d7e7dabc6190c2e159266a04e52f967a9618dcf061d9a2bb03a9dd86c746bc3718724bda112ed8a66708248db6a95ad5455c9da01858fe698

  • SSDEEP

    1536:vfxhMKyqADbY/B7iud3c8TGIOvnToIftA0T3kQa:vv5p0bYJpd3c8w/TBftA0bkQa

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19.exe
    "C:\Users\Admin\AppData\Local\Temp\f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2016
  • C:\Users\Admin\AppData\Local\Temp\f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19.exe
    C:\Users\Admin\AppData\Local\Temp\f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19.exe
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:880
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1904
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1288
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1768
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:668
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1600
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1308
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1384
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1560
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:304
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1468
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1540
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1520
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1624
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1352
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1776
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:884
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:544
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2036
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1344
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1932
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1376
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1056
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1892
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1292
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1868
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1620
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1756
    • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
      2⤵
        PID:1456
      • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1584
      • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1532
      • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:908
      • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2032
      • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1916
      • C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        C:\Users\Admin\AppData\Local\Temp\F1A5E9~1.EXE
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:684

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/304-74-0x0000000000000000-mapping.dmp

    • memory/544-90-0x0000000000000000-mapping.dmp

    • memory/668-64-0x0000000000000000-mapping.dmp

    • memory/684-123-0x0000000000000000-mapping.dmp

    • memory/880-56-0x0000000000000000-mapping.dmp

    • memory/884-88-0x0000000000000000-mapping.dmp

    • memory/908-117-0x0000000000000000-mapping.dmp

    • memory/1056-100-0x0000000000000000-mapping.dmp

    • memory/1288-60-0x0000000000000000-mapping.dmp

    • memory/1292-104-0x0000000000000000-mapping.dmp

    • memory/1308-68-0x0000000000000000-mapping.dmp

    • memory/1344-94-0x0000000000000000-mapping.dmp

    • memory/1352-84-0x0000000000000000-mapping.dmp

    • memory/1376-98-0x0000000000000000-mapping.dmp

    • memory/1384-70-0x0000000000000000-mapping.dmp

    • memory/1456-112-0x0000000000000000-mapping.dmp

    • memory/1468-76-0x0000000000000000-mapping.dmp

    • memory/1520-80-0x0000000000000000-mapping.dmp

    • memory/1532-115-0x0000000000000000-mapping.dmp

    • memory/1540-78-0x0000000000000000-mapping.dmp

    • memory/1560-72-0x0000000000000000-mapping.dmp

    • memory/1584-113-0x0000000000000000-mapping.dmp

    • memory/1600-66-0x0000000000000000-mapping.dmp

    • memory/1620-108-0x0000000000000000-mapping.dmp

    • memory/1624-82-0x0000000000000000-mapping.dmp

    • memory/1756-110-0x0000000000000000-mapping.dmp

    • memory/1768-62-0x0000000000000000-mapping.dmp

    • memory/1776-86-0x0000000000000000-mapping.dmp

    • memory/1868-106-0x0000000000000000-mapping.dmp

    • memory/1892-102-0x0000000000000000-mapping.dmp

    • memory/1904-58-0x0000000000000000-mapping.dmp

    • memory/1916-121-0x0000000000000000-mapping.dmp

    • memory/1932-96-0x0000000000000000-mapping.dmp

    • memory/2016-54-0x00000000760D1000-0x00000000760D3000-memory.dmp

      Filesize

      8KB

    • memory/2032-119-0x0000000000000000-mapping.dmp

    • memory/2036-92-0x0000000000000000-mapping.dmp