Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 15:13

General

  • Target

    32c4798d3af63df51437e208b3bab4b2a86ab4d5330380a8761e78575d43b57e.exe

  • Size

    5.4MB

  • MD5

    6ed9291877d2471efed729caad5ddc9c

  • SHA1

    2ce42f9459ab4b91f6323326b6a49693ed0f78a9

  • SHA256

    32c4798d3af63df51437e208b3bab4b2a86ab4d5330380a8761e78575d43b57e

  • SHA512

    0755a07f5fa52b2a31d8b1e49d416d5e0d69adc0bc7ebef2a30b462d92cbcec3a8f637df98ffcd201aef50e58ba55c5fb43c8b3bdfacabec12099c8c6c915881

  • SSDEEP

    98304:BTOyh4LhJLIdAj9mdgLCwV/C/wiAFfAUKAVqqJCvSc:VOyuLhJLIdA5mVwV/CIF4ULVZovSc

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32c4798d3af63df51437e208b3bab4b2a86ab4d5330380a8761e78575d43b57e.exe
    "C:\Users\Admin\AppData\Local\Temp\32c4798d3af63df51437e208b3bab4b2a86ab4d5330380a8761e78575d43b57e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2348

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2348-132-0x0000000000400000-0x000000000087C000-memory.dmp

          Filesize

          4.5MB

        • memory/2348-133-0x0000000000400000-0x000000000087C000-memory.dmp

          Filesize

          4.5MB

        • memory/2348-134-0x0000000000400000-0x000000000087C000-memory.dmp

          Filesize

          4.5MB