Analysis

  • max time kernel
    38s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 11:47

General

  • Target

    979922cf798ffbeda84c1022f788894b009f8795035aec94f866f33dea17da29.exe

  • Size

    538KB

  • MD5

    9c5bc44d43ad632f98bd15a7213e5d6f

  • SHA1

    038ce3887045cf4a1045f03a96f55334145c9877

  • SHA256

    979922cf798ffbeda84c1022f788894b009f8795035aec94f866f33dea17da29

  • SHA512

    d36488fd3085c2b7ead129f8207cc4268cd3437a5a38f9d1216c4947c7a76c12ad879795ed756a9f63f9c2c8d96f064de26fc134df028d5686cc9faa12b5988b

  • SSDEEP

    12288:dgJafFjkjzT/yryuZDWMcoWMPQY86feeOxxi/1ayX:cafZqqWu83rMok2eO6/X

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\979922cf798ffbeda84c1022f788894b009f8795035aec94f866f33dea17da29.exe
    "C:\Users\Admin\AppData\Local\Temp\979922cf798ffbeda84c1022f788894b009f8795035aec94f866f33dea17da29.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1512-54-0x0000000000400000-0x0000000000603000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-57-0x00000000756A1000-0x00000000756A3000-memory.dmp

    Filesize

    8KB

  • memory/1512-58-0x0000000000400000-0x0000000000603000-memory.dmp

    Filesize

    2.0MB