Analysis

  • max time kernel
    52s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 19:21

General

  • Target

    d413dfa2afc607e2b9031952c29a1d9640201a6da0f9534e08d237ba7fba7bb1.exe

  • Size

    60KB

  • MD5

    96582eace83621995a328122e2c24887

  • SHA1

    8bc00c1f3e90b03872917e556aa1cbc232e7fcb8

  • SHA256

    d413dfa2afc607e2b9031952c29a1d9640201a6da0f9534e08d237ba7fba7bb1

  • SHA512

    2675faacf8c3799d450fc5f1170c3f14b7020b982228022aa074a5a65bcd8b313a499bea8b84a0c8ac5d7e2481fe3f6d5476ac3f6e92aaa9a6c93f15a33b65cd

  • SSDEEP

    768:QasOZ38FjSUSOMQoR1OZ38FjSRZqstqOZ38FjS:/xJUSHQVJfDt3J

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d413dfa2afc607e2b9031952c29a1d9640201a6da0f9534e08d237ba7fba7bb1.exe
    "C:\Users\Admin\AppData\Local\Temp\d413dfa2afc607e2b9031952c29a1d9640201a6da0f9534e08d237ba7fba7bb1.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-56-0x0000000075D61000-0x0000000075D63000-memory.dmp
    Filesize

    8KB

  • memory/2040-57-0x0000000004061000-0x0000000004F0D000-memory.dmp
    Filesize

    14.7MB