Analysis

  • max time kernel
    152s
  • max time network
    211s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2022 01:40

General

  • Target

    afa4d25acf1cc078f231cf9b3e7c77f04507301d9b6e4447ad7e29a6a0e29b36.exe

  • Size

    149KB

  • MD5

    93f94cbbd877cb3caca40ead56d0d5ba

  • SHA1

    35f6472e0640f3f2c73b4b26abe0106f1fd9e917

  • SHA256

    afa4d25acf1cc078f231cf9b3e7c77f04507301d9b6e4447ad7e29a6a0e29b36

  • SHA512

    e1dd737759412c7b0e807dc59fe2e10243af282660109add6f3ff660717cbfb0ac65ff15706e0cf805f97aa60ef2e48e3fe9573fc1f68c7ec9fbeef6360f031f

  • SSDEEP

    3072:IecM9ke+4+W50IS3DtDJgQgoljxj/h7idPSI/ccBq/f3FSlVM22nS3k:/UI03d1goljV/h7igck/f3glVM22yk

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afa4d25acf1cc078f231cf9b3e7c77f04507301d9b6e4447ad7e29a6a0e29b36.exe
    "C:\Users\Admin\AppData\Local\Temp\afa4d25acf1cc078f231cf9b3e7c77f04507301d9b6e4447ad7e29a6a0e29b36.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4288

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4288-132-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/4288-133-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-134-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-135-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-136-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-138-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-137-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-140-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-139-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-141-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/4288-144-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/4288-145-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB