Analysis

  • max time kernel
    9s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 06:57 UTC

General

  • Target

    db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f.exe

  • Size

    1.2MB

  • MD5

    3e6c599d00576b448072902fb48bd8cf

  • SHA1

    87b9d54c4a6992665d59d545f35da54281359be5

  • SHA256

    db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f

  • SHA512

    d27c8450e58d275f2ee3dfd2f19256f7895c5581ef690f4db02aa51c6a47a0b2877238b57900fdae0b10133cf82bad8730781bdfc08720fd0178ee825f976aee

  • SSDEEP

    24576:GE1YV7Ua+wGgharPwGOoZQg64ttgFPExrC+gXMza:GE1YVYhw5aT3I4ttVc+g82

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f.exe
    "C:\Users\Admin\AppData\Local\Temp\db2f5b7f4f5726e9b7d7d23bd234d5911d74f41c31feb4c39c3f2ff54847a35f.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:1728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\oledsp32.dll

    Filesize

    26KB

    MD5

    6db0debfb98119305df3801c4c2555e3

    SHA1

    03b6267361a197c2ee29af483bca73d15192c915

    SHA256

    dcc50a77ef007040e97cf8001a743a7909db19be6b32af28feaa68d775fe2c4f

    SHA512

    5a85de074db1a8bd32aba1a4b6837e2f7bee9ac7734331e77f02289a8b2c3bfde91734cdc525125d3c6800329e9a5f07b56f9d1dd8074b6df49684c90a181fb3

  • memory/1728-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

    Filesize

    8KB

  • memory/1728-55-0x0000000000400000-0x000000000053E000-memory.dmp

    Filesize

    1.2MB

  • memory/1728-57-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/1728-58-0x0000000000400000-0x000000000053E000-memory.dmp

    Filesize

    1.2MB

  • memory/1728-59-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.