Analysis

  • max time kernel
    46s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:43

General

  • Target

    06e345ca170c4e20912ed02d9a50d4c4c02cd81b6585a24d679b37e0cf7b9486.exe

  • Size

    5.4MB

  • MD5

    7abea3c07887ae223c8df19badaf18de

  • SHA1

    8c9569b9f2ce9209e84b68eb86e7274d2fb23af5

  • SHA256

    06e345ca170c4e20912ed02d9a50d4c4c02cd81b6585a24d679b37e0cf7b9486

  • SHA512

    0d555b08515785250efa91942fdcd9463d085d726957ed384c9ecf0d4f17d364f4f76af70fbc84854cedf10e1f11ad543f3add0ad926c307984dd3e7d2098450

  • SSDEEP

    98304:KDU+6lqxONesqOYNVZpis6uipxBBBjsbLrO1aKb5tl:HqsNesOQs65BBBo3r2tl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06e345ca170c4e20912ed02d9a50d4c4c02cd81b6585a24d679b37e0cf7b9486.exe
    "C:\Users\Admin\AppData\Local\Temp\06e345ca170c4e20912ed02d9a50d4c4c02cd81b6585a24d679b37e0cf7b9486.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1732

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\6cdc5c.tmp

    Filesize

    333KB

    MD5

    56a2bcecbd3cddd6f4a35361bf4920d6

    SHA1

    992e63be423f0e61093ba183f49fc0cbec790488

    SHA256

    5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

    SHA512

    473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

  • memory/1732-54-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB

  • memory/1732-55-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB