Analysis

  • max time kernel
    319s
  • max time network
    450s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:28

General

  • Target

    61affad42b4dbbb4be23023e3eb0c4ab225d429db1fad03efada4132e0feffcb.exe

  • Size

    648KB

  • MD5

    59c4910d3ef4b299a806f82ca292ca07

  • SHA1

    17092460c02c6831ce5fea15a3b695c01016c1e4

  • SHA256

    61affad42b4dbbb4be23023e3eb0c4ab225d429db1fad03efada4132e0feffcb

  • SHA512

    e4580e0d91c610460bb3bcc4a98584a0b1fc7565db466a0a278a168a16faa4553fad0e50b4f57439b39ba4abcd64ed4472764572b097a10dd7bf4473f68e8da8

  • SSDEEP

    12288:g72bnueKBLWoD1+R72bnueKBLWoD1+kOX9K4:g72zDKFD1i72zDKFD1rOXA4

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61affad42b4dbbb4be23023e3eb0c4ab225d429db1fad03efada4132e0feffcb.exe
    "C:\Users\Admin\AppData\Local\Temp\61affad42b4dbbb4be23023e3eb0c4ab225d429db1fad03efada4132e0feffcb.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:4468

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads