Analysis

  • max time kernel
    104s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 08:33

General

  • Target

    5b8b7fdf615638f02944fec4e307acfcca794277c735cb9e22728c84bb8eadfa.exe

  • Size

    4.5MB

  • MD5

    9965eacbe6584be4d4b57bdc89f6c749

  • SHA1

    9903c9cbc286ec77da7ee88a574febaeffd3520c

  • SHA256

    5b8b7fdf615638f02944fec4e307acfcca794277c735cb9e22728c84bb8eadfa

  • SHA512

    0e8c5199da5b02c045e6b44965505d6a2dd3e0b6c0e3081f2fb63af75d015f1a8cda11c4be3f015416628b9907379b81982ec3113d5644d71819d707717fa8b5

  • SSDEEP

    49152:oQgxyK4h1BTKfBdndovgboft0S0UFqpxcdrqRvl8qfIjAjE8jWHXU0jaRUZQ2siB:o6KcsZNdkgm0SFAx8Wgn0ErfjaIQigK

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b8b7fdf615638f02944fec4e307acfcca794277c735cb9e22728c84bb8eadfa.exe
    "C:\Users\Admin\AppData\Local\Temp\5b8b7fdf615638f02944fec4e307acfcca794277c735cb9e22728c84bb8eadfa.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3324-132-0x0000000000400000-0x000000000087E000-memory.dmp

    Filesize

    4.5MB

  • memory/3324-133-0x0000000000400000-0x000000000087E000-memory.dmp

    Filesize

    4.5MB

  • memory/3324-134-0x0000000000400000-0x000000000087E000-memory.dmp

    Filesize

    4.5MB

  • memory/3324-135-0x0000000000400000-0x000000000087E000-memory.dmp

    Filesize

    4.5MB