Analysis

  • max time kernel
    157s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 01:20

General

  • Target

    d43d7c3e21da5b54be7d9f78fa3ccd5c482b16f0f832eb7325a25ea3260b3e85.exe

  • Size

    5KB

  • MD5

    ab22d70681b627db1f049c2ae5d2a7e5

  • SHA1

    0bb73f636c2186831b0e0a4acf11d3c46b87df55

  • SHA256

    d43d7c3e21da5b54be7d9f78fa3ccd5c482b16f0f832eb7325a25ea3260b3e85

  • SHA512

    9164564700ae65011f8bc107a9812675abbe0618cb0c391fae2fb6830650c626f4662efa02a572065f5145afb5d1c502771b3f40a686093fa6c264810220bfa7

  • SSDEEP

    48:aKyP8KF3JGnmn9xoDaielwBu7d/0x8S6/Wh6SMlpQo3umwRRBZWmONHESfKs2:pi9FMmQaieiuix8IwSMkLPWRNkSl

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d43d7c3e21da5b54be7d9f78fa3ccd5c482b16f0f832eb7325a25ea3260b3e85.exe
    "C:\Users\Admin\AppData\Local\Temp\d43d7c3e21da5b54be7d9f78fa3ccd5c482b16f0f832eb7325a25ea3260b3e85.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Windows\system32\mmc.exe
      C:\Windows\system32\mmc.exe C:\Windows\system32\com\comexp.msc
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads