Analysis

  • max time kernel
    34s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 23:55

General

  • Target

    c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe

  • Size

    360KB

  • MD5

    670559b9bf9b79d163b28c9f91b291c4

  • SHA1

    407671748811152bcbbcf009662557af2063b583

  • SHA256

    c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539

  • SHA512

    0c0cbb193d525eca3b037ba25c501222b075496522a98135d0ad9c5e0591d2e666afe8d8242225daf9136c4f4008ff2754f924f91f6515a9f32bf1ffec2e7b98

  • SSDEEP

    3072:Fz/92a98YQ19Se8C/ETyeYYQ19qROLz/9ewqZ6z5ktaiJD8yyN:FL9IR3tcbYRXL98Ez+aKIN

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe
    "C:\Users\Admin\AppData\Local\Temp\c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe
      "C:\Users\Admin\AppData\Local\Temp\c0bd5bb9c92c2eb18c0674dbd9501770cb35093e3884c6cbb4dafe6b325d4539.exe" /SETUP
      2⤵
        PID:2008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads