Analysis

  • max time kernel
    17s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 22:44

General

  • Target

    铁血争霸复古之王.exe

  • Size

    2.6MB

  • MD5

    f556c49024df6d97308ab36102d9b059

  • SHA1

    39b10b45aa28215110db26f342d307aeff600675

  • SHA256

    3f9572ded23576066b15d534731d28da9d6eda1ea09d84bb2f182a2c0933661a

  • SHA512

    1365ceb0a461a62d99936223e551d099aacc819febe85e4c1b3b966015dad8b75e31e82d0da3ee6efb1aa0d5bc86c3ae12a3d91d3cbec4de30291148c268c098

  • SSDEEP

    49152:2toK3MJgWJfjRiFqpfSdXYjy0n4w1Ou8HG3WE/OWwcBEP2KHgDfcg+QVX1mEsMFg:qMisiFq4XYm091OufGPLclKHUcgnVQc2

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\铁血争霸复古之王.exe
    "C:\Users\Admin\AppData\Local\Temp\铁血争霸复古之王.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1228

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1228-54-0x0000000075C41000-0x0000000075C43000-memory.dmp

    Filesize

    8KB

  • memory/1228-55-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1228-56-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB