Analysis

  • max time kernel
    187s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 13:33

General

  • Target

    767a3bd052522de419941d14fb91d648dff31ebe05d94d30c2ad44cf75d46ccd.exe

  • Size

    5.3MB

  • MD5

    f607c0e5cc88d449fe97707170ee96e2

  • SHA1

    c6a60a061d97696293ec05338ee8ae827ca1a4ac

  • SHA256

    767a3bd052522de419941d14fb91d648dff31ebe05d94d30c2ad44cf75d46ccd

  • SHA512

    48393eef9dc1eb703a09b64cf2fe8fb6354dbdcb2a8a82c40e24479dc881759a5f57c06ea9e1ae9c9ba6fb8d967b1cbbe4861da38467622b002dffb95b37f3f6

  • SSDEEP

    98304:d9bFm8x3Ga9m75MtyKcmWhuj1jj0PqI2dqP0dZZDg/bmO:d/VsiDWgBjK32dqM7ZDg/7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\767a3bd052522de419941d14fb91d648dff31ebe05d94d30c2ad44cf75d46ccd.exe
    "C:\Users\Admin\AppData\Local\Temp\767a3bd052522de419941d14fb91d648dff31ebe05d94d30c2ad44cf75d46ccd.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4432

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4432-132-0x0000000000400000-0x000000000087F000-memory.dmp

    Filesize

    4.5MB

  • memory/4432-133-0x0000000000400000-0x000000000087F000-memory.dmp

    Filesize

    4.5MB